<?xml version='1.0' encoding='UTF-8'?>
<nvd xmlns:scap-core="http://scap.nist.gov/schema/scap-core/0.1" xmlns:vuln="http://scap.nist.gov/schema/vulnerability/0.4" xmlns="http://scap.nist.gov/schema/feed/vulnerability/2.0" xmlns:patch="http://scap.nist.gov/schema/patch/0.1" xmlns:cvss="http://scap.nist.gov/schema/cvss-v2/0.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:cpe-lang="http://cpe.mitre.org/language/2.0" nvd_xml_version="2.0" pub_date="2019-10-10T04:29:16" xsi:schemaLocation="http://scap.nist.gov/schema/patch/0.1 https://scap.nist.gov/schema/nvd/patch_0.1.xsd http://scap.nist.gov/schema/feed/vulnerability/2.0 https://scap.nist.gov/schema/nvd/nvd-cve-feed_2.0.xsd http://scap.nist.gov/schema/scap-core/0.1 https://scap.nist.gov/schema/nvd/scap-core_0.1.xsd">
  <entry id="CVE-2011-0001">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:zaal:tgt:1.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:zaal:tgt:0.9.5</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.0</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.1</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.2</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.3</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.4</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.5</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.6</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.7</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.8</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.9</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.10</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.11</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.12</vuln:product>
      <vuln:product>cpe:/a:zaal:tgt:1.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0001</vuln:cve-id>
    <vuln:published-datetime>2011-03-15T13:55:02.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.277-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" xml:lang="en">SUSE-SR:2011:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.wpkg.org/pipermail/stgt/2011-March/004473.html" xml:lang="en">[stgt] 20110309 [PATCH] iscsi: fix buffer overflow before login</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2209" xml:lang="en">DSA-2209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0332.html" xml:lang="en">RHSA-2011:0332</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46817" xml:lang="en">46817</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025184" xml:lang="en">1025184</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0636" xml:lang="en">ADV-2011-0636</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/attachment.cgi?id=473779&amp;action=diff" xml:lang="en">https://bugzilla.redhat.com/attachment.cgi?id=473779&amp;action=diff</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=667261" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=667261</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66010" xml:lang="en">lstf-iscsirxhandler-dos(66010)</vuln:reference>
    </vuln:references>
    <vuln:summary>Double free vulnerability in the iscsi_rx_handler function (usr/iscsi/iscsid.c) in the tgt daemon (tgtd) in Linux SCSI target framework (tgt) before 1.0.14, aka scsi-target-utils, allows remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via unknown vectors related to a buffer overflow during iscsi login.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0002">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.24-3"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.24-4"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.25.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.26"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.27"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.30"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.31"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.32"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.90"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.91"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.92"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.93"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.95"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.96"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.97"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.98"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.99"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.100"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.101-1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.101-2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.49.102"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.50"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.50.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.1-1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.1-2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.4"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.5"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.6"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.7"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.7-3"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.7-7"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.8"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.9"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.10"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.11"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.51.12"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.52"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.52.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.52.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.52.3"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.52.4"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.52.5"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.52.6"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.3"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.4"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.5"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.6"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.7"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.53.8"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.3"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.4"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.5"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.6"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.7"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.54.8"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.55"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.1"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.2"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.3"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.4"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.5"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.6"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.7"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.8"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.9"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.10"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.11"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.12"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.13"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.14"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.15"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.16"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.17"/>
        <cpe-lang:fact-ref name="cpe:/a:miloslav_trmac:libuser:0.56.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.3</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.4</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.5</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.6</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.7</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.8</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.8.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.8.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.9</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.10</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.11</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.16.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.18</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.20</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.21</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.23</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.24-3</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.24-4</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.25</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.25.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.26</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.27</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.28</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.29</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.30</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.31</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.32</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.90</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.91</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.92</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.93</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.95</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.96</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.97</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.98</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.99</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.100</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.101-1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.101-2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.49.102</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.50</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.50.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.1-1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.1-2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.4</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.5</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.6</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.7</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.7-3</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.7-7</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.8</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.9</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.10</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.11</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.51.12</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.52</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.52.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.52.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.52.3</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.52.4</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.52.5</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.52.6</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.3</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.4</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.5</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.6</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.7</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.53.8</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.3</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.4</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.5</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.6</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.7</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.54.8</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.55</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.1</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.2</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.3</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.4</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.5</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.6</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.7</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.8</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.9</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.10</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.11</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.12</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.13</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.14</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.15</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.16</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.17</vuln:product>
      <vuln:product>cpe:/a:miloslav_trmac:libuser:0.56.18</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0002</vuln:cve-id>
    <vuln:published-datetime>2011-01-22T17:00:06.677-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.337-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10705" xml:lang="en">http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10705</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html" xml:lang="en">FEDORA-2011-0316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html" xml:lang="en">FEDORA-2011-0320</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024960" xml:lang="en">1024960</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:019" xml:lang="en">MDVSA-2011:019</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0170.html" xml:lang="en">RHSA-2011:0170</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45791" xml:lang="en">45791</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0184" xml:lang="en">ADV-2011-0184</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0201" xml:lang="en">ADV-2011-0201</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0226" xml:lang="en">ADV-2011-0226</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=643227" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=643227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64677" xml:lang="en">libuser-password-security-bypass(64677)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57" xml:lang="en">https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57</vuln:reference>
    </vuln:references>
    <vuln:summary>libuser before 0.57 uses a cleartext password value of (1) !! or (2) x for new LDAP user accounts, which makes it easier for remote attackers to obtain access by specifying one of these values.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0003">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:alpha2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.5_r14348"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.14.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.14.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.16.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.16.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.16.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:stable_2003-08-29"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:stable_2003-11-07"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:stable_2003-11-17"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.1.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.9</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.10</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.11</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.12</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.13</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.14</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.15</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.9</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.10</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.11</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.12</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.13</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.14</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:alpha1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:alpha2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:rc3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:rc4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.5_r14348</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.9</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.10</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.12</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.14.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.14.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.14.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.16.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.16.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.16.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:stable_2003-08-29</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:stable_2003-11-07</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:stable_2003-11-17</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0003</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:05.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.417-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" xml:lang="en">FEDORA-2011-5848</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" xml:lang="en">FEDORA-2011-5812</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" xml:lang="en">FEDORA-2011-5807</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-January/000093.html" xml:lang="en">[MediaWiki-announce] 20110104 MediaWiki security release 1.16.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/04/12" xml:lang="en">[oss-security] 20110104 Re: (possible) CVE request: Clickjacking in Mediawiki</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/04/6" xml:lang="en">[oss-security] 20110104 (possible) CVE request: Clickjacking in Mediawiki</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0017" xml:lang="en">ADV-2011-0017</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.wikimedia.org/show_bug.cgi?id=26561" xml:lang="en">https://bugzilla.wikimedia.org/show_bug.cgi?id=26561</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64476" xml:lang="en">mediawiki-frames-clickjacking(64476)</vuln:reference>
    </vuln:references>
    <vuln:summary>MediaWiki before 1.16.1, when user or site JavaScript or CSS is enabled, allows remote attackers to conduct clickjacking attacks via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0004">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.32"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.34"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.35"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.36"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.37"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:piwik:piwik:0.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.11</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.12</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.13</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.14</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.16</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.17</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.18</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.19</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.20</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.22</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.23</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.24</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.25</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.26</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.27</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.28</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.29</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.30</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.31</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.32</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.33</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.34</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.35</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.36</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.37</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0004</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T15:00:17.000-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-02-25T01:58:20.407-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/06/1" xml:lang="en">[oss-security] 20110105 CVE Request: Multiple XSS Vulnerabiliies &lt; Piwik 1.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/06/15" xml:lang="en">[oss-security] 20110106 Re: CVE Request: Multiple XSS Vulnerabiliies &lt; Piwik 1.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://piwik.org/blog/2011/01/piwik-1-1-2/" xml:lang="en">http://piwik.org/blog/2011/01/piwik-1-1-2/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://piwik.org/blog/2011/01/piwik-1-1-security-advisory/" xml:lang="en">http://piwik.org/blog/2011/01/piwik-1-1-security-advisory/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://piwik.org/blog/2011/01/professional-security-audit-in-piwik/" xml:lang="en">http://piwik.org/blog/2011/01/professional-security-audit-in-piwik/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45659" xml:lang="en">45659</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0013" xml:lang="en">ADV-2011-0013</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Piwik before 1.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0005">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_search"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla%21:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla%21:1.0.15"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:com_search</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0005</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:05.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:21.060-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstormsecurity.org/files/view/97273/joomla1015-xss.txt" xml:lang="en">http://packetstormsecurity.org/files/view/97273/joomla1015-xss.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515553/100/0/threaded" xml:lang="en">20110105 Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515590/100/0/threaded" xml:lang="en">20110107 Re: Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45679" xml:lang="en">45679</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64539" xml:lang="en">joomla-ordering-xss(64539)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the com_search module for Joomla! 1.0.x through 1.0.15 allows remote attackers to inject arbitrary web script or HTML via the ordering parameter to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0006">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0006</vuln:cve-id>
    <vuln:published-datetime>2012-06-21T19:55:01.787-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-06-26T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>1.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2012-06-22T11:22:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" xml:lang="en">http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=867c20265459d30a01b021a9c1e81fb4c5832aa9" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=867c20265459d30a01b021a9c1e81fb4c5832aa9</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/06/18" xml:lang="en">[oss-security] 20110106 Re: CVE Request: kernel [Re: Security review of 2.6.32.28]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=667912" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=667912</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9" xml:lang="en">https://github.com/torvalds/linux/commit/867c20265459d30a01b021a9c1e81fb4c5832aa9</vuln:reference>
    </vuln:references>
    <vuln:summary>The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0007">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:troglobit:pimd:2.1.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:troglobit:pimd:2.1.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0007</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:05.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.527-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.3</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2147" xml:lang="en">DSA-2147</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/07/3" xml:lang="en">[oss-security] 20110107 CVE Request - pimd - Insecure file creation in /var/tmp</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/07/4" xml:lang="en">[oss-security] 20110107 Re: CVE Request - pimd - Insecure file creation in /var/tmp</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45715" xml:lang="en">45715</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0113" xml:lang="en">ADV-2011-0113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64528" xml:lang="en">pimd-pimd-symlink(64528)</vuln:reference>
    </vuln:references>
    <vuln:summary>pimd 2.1.5 and possibly earlier versions allows user-assisted local users to overwrite arbitrary files via a symlink attack on (1) pimd.dump when a USR1 signal is sent, or (2) pimd.cache when USR2 is sent.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0008">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.5.7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.5.8"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.5.9"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.2p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.2p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.2p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3_p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3_p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3_p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3_p4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3_p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3_p6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3_p7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3p4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3p6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.3p7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.4_p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.4_p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.4p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.4p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.5_p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.5_p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.5p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.5p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.7_p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.7p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.7p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.7p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.7p4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.7p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8_p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8_p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8_p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8_p7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8_p8"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8_p9"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8_p12"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p8"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p9"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p10"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p11"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.8p12"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p17"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p18"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p19"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p20"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p21"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p22"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p8"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p9"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p10"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p11"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p12"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p13"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p14"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p15"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p16"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p17"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p18"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p19"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p20"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p21"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p22"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9p23"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p5"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p6"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p7"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.3b1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p1"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p2"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p3"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p4"/>
          <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:redhat:fedora:14"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:todd_miller:sudo:1.3.1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.5.2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.5.3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.5.6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.5.7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.5.8</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.5.9</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.2p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.2p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.2p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3_p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3_p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3_p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3_p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3_p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3_p6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3_p7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3p6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.3p7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.4_p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.4_p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.4p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.4p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.5_p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.5_p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.5p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.5p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.7_p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.7p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.7p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.7p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.7p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.7p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8_p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8_p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8_p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8_p7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8_p8</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8_p9</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8_p12</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p8</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p9</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p10</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p11</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.8p12</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p17</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p18</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p19</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p20</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p21</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p22</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p8</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p9</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p10</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p11</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p12</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p13</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p14</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p15</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p16</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p17</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p18</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p19</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p20</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p21</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p22</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9p23</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.0</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.3b1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0008</vuln:cve-id>
    <vuln:published-datetime>2011-01-20T14:00:07.443-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.603-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html" xml:lang="en">FEDORA-2011-0470</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html" xml:lang="en">FEDORA-2011-0455</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:018" xml:lang="en">MDVSA-2011:018</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0195" xml:lang="en">ADV-2011-0195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0199" xml:lang="en">ADV-2011-0199</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=668843" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=668843</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64965" xml:lang="en">sudo-parse-privilege-escalation(64965)</vuln:reference>
    </vuln:references>
    <vuln:summary>A certain Fedora patch for parse.c in sudo before 1.7.4p5-1.fc14 on Fedora 14 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.  NOTE: this vulnerability exists because of a CVE-2009-0034 regression.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0009">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.10:pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.10:pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.11:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.11:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.11:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.0:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.1:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.2.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.0:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.0:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.0:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.4:pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.4:pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.4:pre3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.5:pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.4.7:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.0:pre0"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.0:pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.1:pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.2:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.2:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.2:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.3:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.3:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.6:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.7.80"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.7.85"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.7.86"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.1:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.1:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.7:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.8:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.8:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:3.8.9:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:4.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:4.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:bestpractical:rt:4.0.0:rc3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.0</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.6</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.7</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.7.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.8</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.9</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.10</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.10:pre1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.10:pre2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.10:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.11</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.11:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.11:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.11:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.0.12</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.6</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.7</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.8</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.10</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.11</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.12</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.13</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.14</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.15</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.16</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.1.17</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.0</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.0:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.0:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.1:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.1:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.1:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.1:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.2:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.3:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.2.3:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.0</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.0:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.0:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.0:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.0:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.0:rc5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.0:rc6</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.2:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.2:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.3:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.3:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.4:pre1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.4:pre2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.4:pre3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.5:pre1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.5:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.5:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.6</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.6:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.6:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.4.7:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.5.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.5.2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.5.3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.5.4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.5.5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.5.6</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.5.7</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.0</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.0:pre0</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.0:pre1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.0:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.0:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.1:pre2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.1:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.1:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.2:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.2:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.2:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.2:rc5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.3:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.3:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.3:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.3:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.4:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.4:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.5:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.5:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.6</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.6:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.6:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.6:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.7</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.8</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.6.9</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.7.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.7.5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.7.80</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.7.85</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.7.86</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.0</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.0:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.0:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.0:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.1:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.1:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.1:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.1:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.1:rc5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.2:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.2:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.3:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.3:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.4:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.5</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.6</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.6:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.7:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.8:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.8:rc3</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.8:rc4</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:3.8.9:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:4.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:4.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:bestpractical:rt:4.0.0:rc3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0009</vuln:cve-id>
    <vuln:published-datetime>2011-01-25T14:00:03.810-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-20T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-01-25T15:29:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610850" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610850</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.bestpractical.com/pipermail/rt-announce/2011-January/000185.html" xml:lang="en">[rt-announce] 20110119 Security vulnerability in RT 3.0 and up</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054740.html" xml:lang="en">FEDORA-2011-1677</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2150" xml:lang="en">DSA-2150</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45959" xml:lang="en">45959</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0190" xml:lang="en">ADV-2011-0190</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0475" xml:lang="en">ADV-2011-0475</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0576" xml:lang="en">ADV-2011-0576</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=672250" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=672250</vuln:reference>
    </vuln:references>
    <vuln:summary>Best Practical Solutions RT 3.x before 3.8.9rc2 and 4.x before 4.0.0rc4 uses the MD5 algorithm for password hashes, which makes it easier for context-dependent attackers to determine cleartext passwords via a brute-force attack on the database.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0010">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p1"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p2"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p3"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p4"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p5"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p6"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.2p7"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.3b1"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p1"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p2"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p3"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.7.4p4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.0</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p5</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p6</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.2p7</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.3b1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p1</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p2</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p3</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.7.4p4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0010</vuln:cve-id>
    <vuln:published-datetime>2011-01-18T13:03:08.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-01-04T21:29:04.523-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.4</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html" xml:lang="en">FEDORA-2011-0470</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html" xml:lang="en">FEDORA-2011-0455</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" xml:lang="en">SUSE-SR:2011:002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/11/3" xml:lang="en">[oss-security] 20110111 CVE request: sudo does not ask for password on GID changes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/12/1" xml:lang="en">[oss-security] 20110112 Re: CVE request: sudo does not ask for password on GID changes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/12/3" xml:lang="en">[oss-security] 20110112 Re: CVE request: sudo does not ask for password on GID changes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-201203-06.xml" xml:lang="en">GLSA-201203-06</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2011&amp;m=slackware-security.593654" xml:lang="en">SSA:2011-041-05</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:018" xml:lang="en">MDVSA-2011:018</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0599.html" xml:lang="en">RHSA-2011:0599</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45774" xml:lang="en">45774</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e" xml:lang="en">http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.sudo.ws/repos/sudo/rev/fe8a94f96542" xml:lang="en">http://www.sudo.ws/repos/sudo/rev/fe8a94f96542</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.sudo.ws/sudo/alerts/runas_group_pw.html" xml:lang="en">http://www.sudo.ws/sudo/alerts/runas_group_pw.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1046-1" xml:lang="en">USN-1046-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0089" xml:lang="en">ADV-2011-0089</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0182" xml:lang="en">ADV-2011-0182</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0195" xml:lang="en">ADV-2011-0195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0199" xml:lang="en">ADV-2011-0199</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0212" xml:lang="en">ADV-2011-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0362" xml:lang="en">ADV-2011-0362</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=668879" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=668879</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64636" xml:lang="en">sudo-groupid-privilege-escalation(64636)</vuln:reference>
    </vuln:references>
    <vuln:summary>check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0011">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.10.5"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.10.6"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.11.0:rc0"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.11.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:qemu:qemu:0.11.0:rc2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:qemu:qemu:0.1</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.1.1</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.1.2</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.1.3</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.1.4</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.1.5</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.1.6</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.10.0</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.10.1</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.10.2</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.10.3</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.10.4</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.10.5</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.10.6</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.11.0:rc0</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.11.0:rc1</vuln:product>
      <vuln:product>cpe:/a:qemu:qemu:0.11.0:rc2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0011</vuln:cve-id>
    <vuln:published-datetime>2012-06-21T11:55:05.863-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.727-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2011-0345.html" xml:lang="en">RHSA-2011:0345</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://ubuntu.com/usn/usn-1063-1" xml:lang="en">USN-1063-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/10/3" xml:lang="en">[oss-security] 20110110 CVE request: qemu-kvm: Setting VNC password to  empty string silently disables all authentication</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/11/1" xml:lang="en">[oss-security] 20110110 Re: CVE request: qemu-kvm: Setting VNC password to  empty string silently disables all authentication</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/12/2" xml:lang="en">[oss-security] 20110112 Re: CVE request: qemu-kvm: Setting VNC password to  empty string silently disables all authentication</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/697197" xml:lang="en">https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/697197</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65215" xml:lang="en">qemu-vnc-security-bypass(65215)</vuln:reference>
    </vuln:references>
    <vuln:summary>qemu-kvm before 0.11.0 disables VNC authentication when the password is cleared, which allows remote attackers to bypass authentication and establish VNC sessions.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0012">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:redhat:spice-xpi:2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:redhat:spice-xpi:2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:redhat:spice-xpi:2.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:redhat:spice-xpi:2.2</vuln:product>
      <vuln:product>cpe:/a:redhat:spice-xpi:2.3</vuln:product>
      <vuln:product>cpe:/a:redhat:spice-xpi:2.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0012</vuln:cve-id>
    <vuln:published-datetime>2011-04-18T13:55:00.937-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-18T13:55:00.937-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.3</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-04-18T14:22:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0426.html" xml:lang="en">RHSA-2011:0426</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47269" xml:lang="en">47269</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025304" xml:lang="en">1025304</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0899" xml:lang="en">ADV-2011-0899</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=639869" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=639869</vuln:reference>
    </vuln:references>
    <vuln:summary>The SPICE Firefox plug-in (spice-xpi) 2.4, 2.3, 2.2, and possibly other versions allows local users to overwrite arbitrary files via a symlink attack on the usbrdrctl log file, which has a predictable name.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0013">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:7.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.29"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.29"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.30"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.31"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:tomcat:5.5.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.28</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.29</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.30</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.31</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.28</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.29</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:7.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0013</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T20:00:01.557-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-25T07:33:03.633-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12878" name="oval:org.mitre.oval:def:12878"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14945" name="oval:org.mitre.oval:def:14945"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19269" name="oval:org.mitre.oval:def:19269"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=130168502603566&amp;w=2" xml:lang="en">HPSBUX02645</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=132215163318824&amp;w=2" xml:lang="en">SSRT100627</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=136485229118404&amp;w=2" xml:lang="en">HPSBUX02860</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=139344343412337&amp;w=2" xml:lang="en">HPSBST02955</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8093" xml:lang="en">8093</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.32" xml:lang="en">http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.32</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30" xml:lang="en">http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.30</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.6_(released_14_Jan_2011)" xml:lang="en">http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.6_(released_14_Jan_2011)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2160" xml:lang="en">DSA-2160</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:030" xml:lang="en">MDVSA-2011:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0791.html" xml:lang="en">RHSA-2011:0791</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0896.html" xml:lang="en">RHSA-2011:0896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0897.html" xml:lang="en">RHSA-2011:0897</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-1845.html" xml:lang="en">RHSA-2011:1845</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516209/30/90/threaded" xml:lang="en">20110205 [SECURITY] CVE-2011-0013 Apache Tomcat Manager XSS vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46174" xml:lang="en">46174</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025026" xml:lang="en">1025026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0376" xml:lang="en">ADV-2011-0376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=675786" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=675786</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0014">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8j"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8k"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8l"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8m"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8n"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8o"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8p"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8q"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:1.0.0c"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8h</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8i</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8j</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8k</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8l</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8m</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8n</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8o</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8p</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8q</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:1.0.0c</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0014</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T20:00:01.777-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:49.957-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18985" name="oval:org.mitre.oval:def:18985"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2011-002.txt.asc" xml:lang="en">NetBSD-SA2011-002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777" xml:lang="en">HPSBMA02658</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054007.html" xml:lang="en">FEDORA-2011-1273</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=130497251507577&amp;w=2" xml:lang="en">SSRT100475</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=131042179515633&amp;w=2" xml:lang="en">HPSBUX02689</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2011&amp;m=slackware-security.668823" xml:lang="en">SSA:2011-041-04</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2162" xml:lang="en">DSA-2162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:028" xml:lang="en">MDVSA-2011:028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openssl.org/news/secadv_20110208.txt" xml:lang="en">http://www.openssl.org/news/secadv_20110208.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0677.html" xml:lang="en">RHSA-2011:0677</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46264" xml:lang="en">46264</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025050" xml:lang="en">1025050</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1064-1" xml:lang="en">USN-1064-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0361" xml:lang="en">ADV-2011-0361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0387" xml:lang="en">ADV-2011-0387</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0389" xml:lang="en">ADV-2011-0389</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0395" xml:lang="en">ADV-2011-0395</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0399" xml:lang="en">ADV-2011-0399</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0603" xml:lang="en">ADV-2011-0603</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://support.f5.com/csp/article/K10534046" xml:lang="en">https://support.f5.com/csp/article/K10534046</vuln:reference>
    </vuln:references>
    <vuln:summary>ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0015">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre24"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre27"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.1:alpha-cvs"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.8:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.20:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.21:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.22:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.23:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.24:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.25:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.26:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.27:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.28:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.32:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.33"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.34:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.35"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.20:alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tor:tor:0.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre24</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre27</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.1:alpha-cvs</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.8:beta</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.30</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.31</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.20:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.21:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.22:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.23:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.24:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.25:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.26:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.27:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.28:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.32:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.33</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.34:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.35</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.24</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.27</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.28</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.20:alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0015</vuln:cve-id>
    <vuln:published-datetime>2011-01-19T07:00:06.623-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-19T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-01-19T13:20:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://archives.seul.org/or/announce/Jan-2011/msg00000.html" xml:lang="en">[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blog.torproject.org/blog/tor-02129-released-security-patches" xml:lang="en">http://blog.torproject.org/blog/tor-02129-released-security-patches</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2148" xml:lang="en">DSA-2148</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/18/7" xml:lang="en">[oss-security] 20110118 Re: CVE request: tor</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45832" xml:lang="en">45832</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024980" xml:lang="en">1024980</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0131" xml:lang="en">ADV-2011-0131</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0132" xml:lang="en">ADV-2011-0132</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" xml:lang="en">https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://trac.torproject.org/projects/tor/ticket/2324" xml:lang="en">https://trac.torproject.org/projects/tor/ticket/2324</vuln:reference>
    </vuln:references>
    <vuln:summary>Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0016">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre24"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre27"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.1:alpha-cvs"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.8:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.20:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.21:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.22:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.23:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.24:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.25:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.26:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.27:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.28:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.32:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.33"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.34:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.35"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.20:alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tor:tor:0.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre24</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre27</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.1:alpha-cvs</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.8:beta</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.30</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.31</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.20:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.21:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.22:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.23:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.24:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.25:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.26:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.27:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.28:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.32:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.33</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.34:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.35</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.24</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.27</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.28</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.20:alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0016</vuln:cve-id>
    <vuln:published-datetime>2011-01-19T07:00:19.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-01-22T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-01-19T13:22:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://archives.seul.org/or/announce/Jan-2011/msg00000.html" xml:lang="en">[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blog.torproject.org/blog/tor-02129-released-security-patches" xml:lang="en">http://blog.torproject.org/blog/tor-02129-released-security-patches</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2148" xml:lang="en">DSA-2148</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2011/01/18/7" xml:lang="en">[oss-security] 20110118 Re: CVE request: tor</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45832" xml:lang="en">45832</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024980" xml:lang="en">1024980</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0131" xml:lang="en">ADV-2011-0131</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0132" xml:lang="en">ADV-2011-0132</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" xml:lang="en">https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://trac.torproject.org/projects/tor/ticket/2384" xml:lang="en">https://trac.torproject.org/projects/tor/ticket/2384</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://trac.torproject.org/projects/tor/ticket/2385" xml:lang="en">https://trac.torproject.org/projects/tor/ticket/2385</vuln:reference>
    </vuln:references>
    <vuln:summary>Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0017">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.01"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.02"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.03"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.12"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.13"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.14"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.15"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.16"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.20"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.21"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.22"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.30"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.31"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.32"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.33"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.34"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.35"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:3.36"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.00"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.01"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.02"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.03"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.04"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.05"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.11"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.12"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.14"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.20"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.21"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.22"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.23"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.24"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.30"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.31"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.32"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.33"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.34"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.40"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.41"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.42"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.43"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.44"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.50"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.51"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.52"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.53"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.54"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.60"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.61"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.62"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.63"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.64"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.65"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.66"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.67"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.68"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.69"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.70"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.71"/>
        <cpe-lang:fact-ref name="cpe:/a:exim:exim:4.72"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:exim:exim:2.10</vuln:product>
      <vuln:product>cpe:/a:exim:exim:2.11</vuln:product>
      <vuln:product>cpe:/a:exim:exim:2.12</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.00</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.01</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.02</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.03</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.10</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.11</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.12</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.13</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.14</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.15</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.16</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.20</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.21</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.22</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.30</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.31</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.32</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.33</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.34</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.35</vuln:product>
      <vuln:product>cpe:/a:exim:exim:3.36</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.00</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.01</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.02</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.03</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.04</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.05</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.10</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.11</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.12</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.14</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.20</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.21</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.22</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.23</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.24</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.30</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.31</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.32</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.33</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.34</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.40</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.41</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.42</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.43</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.44</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.50</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.51</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.52</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.53</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.54</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.60</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.61</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.62</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.63</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.64</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.65</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.66</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.67</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.68</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.69</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.70</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.71</vuln:product>
      <vuln:product>cpe:/a:exim:exim:4.72</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0017</vuln:cve-id>
    <vuln:published-datetime>2011-02-01T20:00:06.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.807-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74" xml:lang="en">ftp://ftp.exim.org/pub/exim/ChangeLogs/ChangeLog-4.74</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.exim.org/lurker/message/20110126.034702.4d69c278.en.html" xml:lang="en">[exim-announce] 20110125 Exim 4.74 Release</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" xml:lang="en">SUSE-SR:2011:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2154" xml:lang="en">DSA-2154</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46065" xml:lang="en">46065</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1060-1" xml:lang="en">USN-1060-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0224" xml:lang="en">ADV-2011-0224</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0245" xml:lang="en">ADV-2011-0245</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0364" xml:lang="en">ADV-2011-0364</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0464" xml:lang="en">ADV-2011-0464</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65028" xml:lang="en">exim-openlog-privilege-escalation(65028)</vuln:reference>
    </vuln:references>
    <vuln:summary>The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0018">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:openvas:openvas_manager:2.0:rc2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:beta6</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:beta7</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.1</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.2</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:1.0.3</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:openvas:openvas_manager:2.0:rc2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0018</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T11:00:02.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:21.857-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/16086" xml:lang="en">16086</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openvas.org/OVSA20110118.html" xml:lang="en">http://www.openvas.org/OVSA20110118.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515971/100/0/threaded" xml:lang="en">20110125 [OVSA20110118] OpenVAS Manager Vulnerable To Command Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45987" xml:lang="en">45987</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0208" xml:lang="en">ADV-2011-0208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65011" xml:lang="en">openvas-email-command-execution(65011)</vuln:reference>
    </vuln:references>
    <vuln:summary>The email function in manage_sql.c in OpenVAS Manager 1.0.x through 1.0.3 and 2.0.x through 2.0rc2 allows remote authenticated users to execute arbitrary commands via the (1) To or (2) From e-mail address in an OMP request to the Greenbone Security Assistant (GSA).</vuln:summary>
  </entry>
  <entry id="CVE-2011-0019">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.7.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:redhat:directory_server:8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:directory_server:8.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.7.5</vuln:product>
      <vuln:product>cpe:/a:redhat:directory_server:8.2</vuln:product>
      <vuln:product>cpe:/a:redhat:directory_server:8.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0019</vuln:cve-id>
    <vuln:published-datetime>2011-02-23T14:00:01.670-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:28:53.783-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0293.html" xml:lang="en">RHSA-2011:0293</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46489" xml:lang="en">46489</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025102" xml:lang="en">1025102</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=666076" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=666076</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=670914" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=670914</vuln:reference>
    </vuln:references>
    <vuln:summary>slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0020">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:0.24"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:0.26"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.28.0"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.28.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.28.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.28.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:pango:pango:0.20</vuln:product>
      <vuln:product>cpe:/a:pango:pango:0.21</vuln:product>
      <vuln:product>cpe:/a:pango:pango:0.22</vuln:product>
      <vuln:product>cpe:/a:pango:pango:0.23</vuln:product>
      <vuln:product>cpe:/a:pango:pango:0.24</vuln:product>
      <vuln:product>cpe:/a:pango:pango:0.25</vuln:product>
      <vuln:product>cpe:/a:pango:pango:0.26</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.0</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.1</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.2</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.3</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.4</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.5</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.6</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.7</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.8</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.9</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.10</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.11</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.12</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.13</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.14</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.15</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.16</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.17</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.18</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.19</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.20</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.21</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.22</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.23</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.24</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.25</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.26</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.27</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.28.0</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.28.1</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.28.2</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.28.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0020</vuln:cve-id>
    <vuln:published-datetime>2011-01-24T13:00:03.783-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:22.947-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/18/6" xml:lang="en">[oss-security] 20110118 CVE request: heap corruption in libpango</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/20/2" xml:lang="en">[oss-security] 20110120 Re: CVE request: heap corruption in libpango</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0180.html" xml:lang="en">RHSA-2011:0180</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45842" xml:lang="en">45842</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024994" xml:lang="en">1024994</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0186" xml:lang="en">ADV-2011-0186</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0238" xml:lang="en">ADV-2011-0238</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616" xml:lang="en">https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.gnome.org/show_bug.cgi?id=639882" xml:lang="en">https://bugzilla.gnome.org/show_bug.cgi?id=639882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=671122" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=671122</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64832" xml:lang="en">pango-pango-bo(64832)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0021">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.1.99b"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.1.99e"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.1.99f"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.1.99g"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.1.99h"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.1.99i"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.60"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.61"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.62"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.63"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.70"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.71"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.72"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.73"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.80"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.81"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.82"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.83"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.90"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.91"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.2.92"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.8a"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:0.9.10"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:videolan:vlc_media_player:1.1.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.1.99b</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.1.99e</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.1.99f</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.1.99g</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.1.99h</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.1.99i</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.60</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.61</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.62</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.63</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.70</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.71</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.72</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.73</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.80</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.81</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.82</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.83</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.90</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.91</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.2.92</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.3.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.3.1</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.4.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.4.1</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.4.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.4.3</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.4.4</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.4.5</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.4.6</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.5.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.5.1</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.5.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.5.3</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.6.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.6.1</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.6.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.7.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.7.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.8.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.8.1</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.8.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.8.4</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.8.5</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.8.6</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.3</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.4</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.5</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.6</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.8a</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.9</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:0.9.10</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.0.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.0.1</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.0.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.0.3</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.0.4</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.0.5</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.0.6</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.1.0</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.1.1</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.1.2</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.1.3</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.1.4</vuln:product>
      <vuln:product>cpe:/a:videolan:vlc_media_player:1.1.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0021</vuln:cve-id>
    <vuln:published-datetime>2011-01-25T14:00:04.370-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:50.037-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12460" name="oval:org.mitre.oval:def:12460"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://download.videolan.org/pub/videolan/vlc/1.1.6/vlc-1.1.6.tar.bz2" xml:lang="en">http://download.videolan.org/pub/videolan/vlc/1.1.6/vlc-1.1.6.tar.bz2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.videolan.org/?p=vlc.git;a=commit;h=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab" xml:lang="en">http://git.videolan.org/?p=vlc.git;a=commit;h=f9b664eac0e1a7bceed9d7b5854fd9fc351b4aab</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/19/6" xml:lang="en">[oss-security] 20110119 CVE request: heap corruption in VLC media player</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/01/20/3" xml:lang="en">[oss-security] 20110120 Re: CVE request: heap corruption in VLC media player</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45927" xml:lang="en">45927</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0185" xml:lang="en">ADV-2011-0185</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64879" xml:lang="en">vlcmediaplayer-cdg-code-execution(64879)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple heap-based buffer overflows in cdg.c in the CDG decoder in VideoLAN VLC Media Player before 1.1.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted CDG video.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0022">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.5:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.5:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:a2"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:a3"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:a4"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6:rc7"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.7:alpha3"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.8:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:fedoraproject:389_directory_server:1.2.8:alpha2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:redhat:directory_server:8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:directory_server:8.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.1</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.2</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.3</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.5</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.5:rc1</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.5:rc2</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.5:rc3</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.5:rc4</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:a2</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:a3</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:a4</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:rc1</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:rc2</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:rc3</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:rc6</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6:rc7</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.6.1</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.7:alpha3</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.7.5</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.8:alpha1</vuln:product>
      <vuln:product>cpe:/a:fedoraproject:389_directory_server:1.2.8:alpha2</vuln:product>
      <vuln:product>cpe:/a:redhat:directory_server:8.2</vuln:product>
      <vuln:product>cpe:/a:redhat:directory_server:8.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0022</vuln:cve-id>
    <vuln:published-datetime>2011-02-23T14:00:01.813-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:28:54.470-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.7</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0293.html" xml:lang="en">RHSA-2011:0293</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46489" xml:lang="en">46489</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025102" xml:lang="en">1025102</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=671199" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=671199</vuln:reference>
    </vuln:references>
    <vuln:summary>The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0024">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.2</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.3</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.4</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.5</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.6</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.7</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.8</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.1</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.2</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.3</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.4</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.5</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.6</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.7</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.8</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.9</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.10</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.11</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.12</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.13</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.14</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.15</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.16</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0024</vuln:cve-id>
    <vuln:published-datetime>2011-03-28T12:55:03.780-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-29T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-28T13:54:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0370.html" xml:lang="en">RHSA-2011:0370</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0719" xml:lang="en">ADV-2011-0719</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=671331" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=671331</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0025">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.7.7"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:icedtea:1.9.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:redhat:icedtea:1.7</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.7.1</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.7.2</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.7.3</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.7.4</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.7.5</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.7.6</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.7.7</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.8</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.8.1</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.8.2</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.8.3</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.8.4</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.9</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.9.1</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.9.2</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.9.3</vuln:product>
      <vuln:product>cpe:/a:redhat:icedtea:1.9.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0025</vuln:cve-id>
    <vuln:published-datetime>2011-02-04T15:00:02.447-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:23.073-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blog.fuseyism.com/index.php/2011/02/01/security-icedtea6-178-185-195-released/" xml:lang="en">http://blog.fuseyism.com/index.php/2011/02/01/security-icedtea6-178-185-195-released/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset;node=3bd328e4b515" xml:lang="en">http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset;node=3bd328e4b515</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-201406-32.xml" xml:lang="en">GLSA-201406-32</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2224" xml:lang="en">DSA-2224</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" xml:lang="en">MDVSA-2011:054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46110" xml:lang="en">46110</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1055-1" xml:lang="en">USN-1055-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65151" xml:lang="en">icedtea-jar-security-bypass(65151)</vuln:reference>
    </vuln:references>
    <vuln:summary>IcedTea 1.7 before 1.7.8, 1.8 before 1.8.5, and 1.9 before 1.9.5 does not properly verify signatures for JAR files that (1) are "partially signed" or (2) signed by multiple entities, which allows remote attackers to trick users into executing code that appears to come from a trusted source.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0026">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:data_access_components:2.8:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:data_access_components:2.8:sp2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_data_access_components:6.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:data_access_components:2.8:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:data_access_components:2.8:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_data_access_components:6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0026</vuln:cve-id>
    <vuln:published-datetime>2011-01-11T20:00:01.807-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12333" name="oval:org.mitre.oval:def:12333"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100124846" xml:lang="en">http://support.avaya.com/css/P8/documents/100124846</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45695" xml:lang="en">45695</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024947" xml:lang="en">1024947</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-011A.html" xml:lang="en">TA11-011A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0075" xml:lang="en">ADV-2011-0075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-001/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-001/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-002" xml:lang="en">MS11-002</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0027">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:data_access_components:2.8:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:data_access_components:2.8:sp2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_data_access_components:6.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:data_access_components:2.8:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:data_access_components:2.8:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_data_access_components:6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0027</vuln:cve-id>
    <vuln:published-datetime>2011-01-11T20:00:01.887-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12411" name="oval:org.mitre.oval:def:12411"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100124846" xml:lang="en">http://support.avaya.com/css/P8/documents/100124846</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://vreugdenhilresearch.nl/ms11-002-pwn2own-heap-overflow/" xml:lang="en">http://vreugdenhilresearch.nl/ms11-002-pwn2own-heap-overflow/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45698" xml:lang="en">45698</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024947" xml:lang="en">1024947</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-011A.html" xml:lang="en">TA11-011A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0075" xml:lang="en">ADV-2011-0075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-002/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-002/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-002" xml:lang="en">MS11-002</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnerability."  NOTE: this might be a duplicate of CVE-2010-1117 or CVE-2010-1118.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0028">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0028</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:00.923-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12301" name="oval:org.mitre.oval:def:12301"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-033" xml:lang="en">MS11-033</vuln:reference>
    </vuln:references>
    <vuln:summary>WordPad in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly parse fields in Word documents, which allows remote attackers to execute arbitrary code via a crafted .doc file, aka "WordPad Converter Parsing Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0029">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:remote_desktop_connection_client:5.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:remote_desktop_connection_client:6.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:remote_desktop_connection_client:7.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:remote_desktop_connection_client:6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:remote_desktop_connection_client:5.2</vuln:product>
      <vuln:product>cpe:/a:microsoft:remote_desktop_connection_client:6.0</vuln:product>
      <vuln:product>cpe:/a:microsoft:remote_desktop_connection_client:6.1</vuln:product>
      <vuln:product>cpe:/a:microsoft:remote_desktop_connection_client:7.0</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0029</vuln:cve-id>
    <vuln:published-datetime>2011-03-09T18:00:01.793-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12480" name="oval:org.mitre.oval:def:12480"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025172" xml:lang="en">1025172</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-067A.html" xml:lang="en">TA11-067A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0616" xml:lang="en">ADV-2011-0616</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-017" xml:lang="en">MS11-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in the client in Microsoft Remote Desktop Connection 5.2, 6.0, 6.1, and 7.0 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .rdp file, aka "Remote Desktop Insecure Library Loading Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0030">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0030</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:01.367-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:08.850-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.7</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12476" name="oval:org.mitre.oval:def:12476"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025045" xml:lang="en">1025045</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0323" xml:lang="en">ADV-2011-0323</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-010" xml:lang="en">MS11-010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64917" xml:lang="en">ms-csrss-privilege-escalation(64917)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted application that continues to execute throughout the logout of one user and the login session of the next user, aka "CSRSS Elevation of Privilege Vulnerability," a different vulnerability than CVE-2010-0023.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0031">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0031</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:07.977-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:21.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12313" name="oval:org.mitre.oval:def:12313"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46139" xml:lang="en">46139</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025044" xml:lang="en">1025044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0322" xml:lang="en">ADV-2011-0322</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-009" xml:lang="en">MS11-009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64919" xml:lang="en">ms-win-jscript-info-disclosure(64919)</vuln:reference>
    </vuln:references>
    <vuln:summary>The (1) JScript 5.8 and (2) VBScript 5.8 scripting engines in Microsoft Windows Server 2008 R2 and Windows 7 do not properly load decoded scripts obtained from web pages, which allows remote attackers to trigger memory corruption and consequently obtain sensitive information via a crafted web site, aka "Scripting Engines Information Disclosure Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0032">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-:sp1:x86"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_center_tv_pack"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:windows_media_center_tv_pack</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-:sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-:sp1:x86</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2:sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0032</vuln:cve-id>
    <vuln:published-datetime>2011-03-09T18:00:01.840-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:21.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12506" name="oval:org.mitre.oval:def:12506"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46682" xml:lang="en">46682</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025170" xml:lang="en">1025170</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-067A.html" xml:lang="en">TA11-067A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0615" xml:lang="en">ADV-2011-0615</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015" xml:lang="en">MS11-015</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in DirectShow in Microsoft Windows Vista SP1 and SP2, Windows 7 Gold and SP1, Windows Server 2008 R2 and R2 SP1, and Windows Media Center TV Pack for Windows Vista allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a Digital Video Recording (.dvr-ms), Windows Recorded TV Show (.wtv), or .mpg file, aka "DirectShow Insecure Library Loading Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0033">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0033</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:13.427-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11593" name="oval:org.mitre.oval:def:11593"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100127239" xml:lang="en">http://support.avaya.com/css/P8/documents/100127239</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46106" xml:lang="en">46106</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025034" xml:lang="en">1025034</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0320" xml:lang="en">ADV-2011-0320</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-007" xml:lang="en">MS11-007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64906" xml:lang="en">ms-opentype-cff-code-execution(64906)</vuln:reference>
    </vuln:references>
    <vuln:summary>The OpenType Compact Font Format (CFF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate parameter values in OpenType fonts, which allows remote attackers to execute arbitrary code via a crafted font, aka "OpenType Font Encoded Character Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0034">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-:sp1:x86"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2:sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-:sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-:sp1:x86</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2:sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2:sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0034</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:00.970-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11860" name="oval:org.mitre.oval:def:11860"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-032" xml:lang="en">MS11-032</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the OpenType Compact Font Format (aka OTF or CFF) driver in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via crafted parameter values in an OpenType font, aka "OpenType Font Stack Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0035">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:7</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0035</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:13.487-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12371" name="oval:org.mitre.oval:def:12371"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100127294" xml:lang="en">http://support.avaya.com/css/P8/documents/100127294</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46157" xml:lang="en">46157</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025038" xml:lang="en">1025038</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0318" xml:lang="en">ADV-2011-0318</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003" xml:lang="en">MS11-003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64911" xml:lang="en">ms-explorer-code-execution(64911)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2010-2556 and CVE-2011-0036.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0036">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:7</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0036</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:13.550-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12261" name="oval:org.mitre.oval:def:12261"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100127294" xml:lang="en">http://support.avaya.com/css/P8/documents/100127294</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46158" xml:lang="en">46158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025038" xml:lang="en">1025038</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0318" xml:lang="en">ADV-2011-0318</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003" xml:lang="en">MS11-003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64912" xml:lang="en">ms-explorer-code-exec(64912)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, related to a "dangling pointer," aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2010-2556 and CVE-2011-0035.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0037">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:forefront_client_security"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:forefront_endpoint_protection_2010:-"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:malicious_software_removal_tool"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:malware_protection_engine:0.1.13.192"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:malware_protection_engine:1.1.3520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:malware_protection_engine:1.1.6502.0"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:security_essentials"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_defender"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_live_onecare"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:forefront_client_security</vuln:product>
      <vuln:product>cpe:/a:microsoft:forefront_endpoint_protection_2010:-</vuln:product>
      <vuln:product>cpe:/a:microsoft:malicious_software_removal_tool</vuln:product>
      <vuln:product>cpe:/a:microsoft:malware_protection_engine:0.1.13.192</vuln:product>
      <vuln:product>cpe:/a:microsoft:malware_protection_engine:1.1.3520.0</vuln:product>
      <vuln:product>cpe:/a:microsoft:malware_protection_engine:1.1.6502.0</vuln:product>
      <vuln:product>cpe:/a:microsoft:security_essentials</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_defender</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_live_onecare</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0037</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T13:00:01.213-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:23.493-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025117" xml:lang="en">1025117</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.microsoft.com/technet/security/advisory/2491888.mspx" xml:lang="en">http://www.microsoft.com/technet/security/advisory/2491888.mspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46540" xml:lang="en">46540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0486" xml:lang="en">ADV-2011-0486</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65626" xml:lang="en">ms-malware-engine-priv-esc(65626)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0038">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie:8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0038</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:13.613-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12270" name="oval:org.mitre.oval:def:12270"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100127294" xml:lang="en">http://support.avaya.com/css/P8/documents/100127294</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortiguard.com/advisory/FGA-2011-04.html" xml:lang="en">http://www.fortiguard.com/advisory/FGA-2011-04.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46159" xml:lang="en">46159</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025038" xml:lang="en">1025038</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0318" xml:lang="en">ADV-2011-0318</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003" xml:lang="en">MS11-003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64913" xml:lang="en">ms-ie-dll-code-execution(64913)</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in Microsoft Internet Explorer 8 might allow local users to gain privileges via a Trojan horse IEShims.dll in the current working directory, as demonstrated by a Desktop directory that contains an HTML file, aka "Internet Explorer Insecure Library Loading Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0039">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0039</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.070-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:15.587-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12537" name="oval:org.mitre.oval:def:12537"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46152" xml:lang="en">46152</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025049" xml:lang="en">1025049</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0327" xml:lang="en">ADV-2011-0327</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-014" xml:lang="en">MS11-014</vuln:reference>
    </vuln:references>
    <vuln:summary>The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly process authentication requests, which allows local users to gain privileges via a request with a crafted length, aka "LSASS Length Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0040">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0040</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.150-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:16.133-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12485" name="oval:org.mitre.oval:def:12485"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46145" xml:lang="en">46145</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025042" xml:lang="en">1025042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0319" xml:lang="en">ADV-2011-0319</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-005" xml:lang="en">MS11-005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64915" xml:lang="en">ms-win-active-directory-dos(64915)</vuln:reference>
    </vuln:references>
    <vuln:summary>The server in Microsoft Active Directory on Windows Server 2003 SP2 does not properly handle an update request for a service principal name (SPN), which allows remote attackers to cause a denial of service (authentication downgrade or outage) via a crafted request that triggers name collisions, aka "Active Directory SPN Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0041">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0041</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.017-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11854" name="oval:org.mitre.oval:def:11854"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-029" xml:lang="en">MS11-029</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in gdiplus.dll in GDI+ in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold and SP2, and Office XP SP3 allows remote attackers to execute arbitrary code via a crafted EMF image, aka "GDI+ Integer Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0042">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_xp_media_center:2005:sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-:sp1:x86"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_center_tv_pack"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:windows_media_center_tv_pack</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_xp_media_center:2005:sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-:sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-:sp1:x86</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0042</vuln:cve-id>
    <vuln:published-datetime>2011-03-09T18:00:01.857-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:21.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12281" name="oval:org.mitre.oval:def:12281"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46680" xml:lang="en">46680</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025169" xml:lang="en">1025169</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-067A.html" xml:lang="en">TA11-067A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0615" xml:lang="en">ADV-2011-0615</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-015" xml:lang="en">MS11-015</vuln:reference>
    </vuln:references>
    <vuln:summary>SBE.dll in the Stream Buffer Engine in Windows Media Player and Windows Media Center in Microsoft Windows XP SP2 and SP3, Windows XP Media Center Edition 2005 SP3, Windows Vista SP1 and SP2, Windows 7 Gold and SP1, and Windows Media Center TV Pack for Windows Vista does not properly parse Digital Video Recording (.dvr-ms) files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DVR-MS Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0043">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0043</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:13.677-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12432" name="oval:org.mitre.oval:def:12432"/>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100127250" xml:lang="en">http://support.avaya.com/css/P8/documents/100127250</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46130" xml:lang="en">46130</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025048" xml:lang="en">1025048</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0326" xml:lang="en">ADV-2011-0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013" xml:lang="en">MS11-013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64900" xml:lang="en">ms-kerberos-checksum-privilege-escalation(64900)</vuln:reference>
    </vuln:references>
    <vuln:summary>Kerberos in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 supports weak hashing algorithms, which allows local users to gain privileges by operating a service that sends crafted service tickets, as demonstrated by the CRC32 algorithm, aka "Kerberos Unkeyed Checksum Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0044">
    <vuln:cve-id>CVE-2011-0044</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.620-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.620-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0045">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0045</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.243-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:18.947-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11996" name="oval:org.mitre.oval:def:11996"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8110" xml:lang="en">8110</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100127248" xml:lang="en">http://support.avaya.com/css/P8/documents/100127248</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516276/100/0/threaded" xml:lang="en">20110208 ZDI-11-064: Microsoft Windows WmiTraceMessageVa Local Kernel Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46136" xml:lang="en">46136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025046" xml:lang="en">1025046</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0324" xml:lang="en">ADV-2011-0324</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-064" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-064</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-011" xml:lang="en">MS11-011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64926" xml:lang="en">ms-win-kernel-privilege-escalation(64926)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Trace Events functionality in the kernel in Microsoft Windows XP SP3 does not properly perform type conversion, which causes integer truncation and insufficient memory allocation and triggers a buffer overflow, which allows local users to gain privileges via a crafted application, related to WmiTraceMessageVa, aka "Windows Kernel Integer Truncation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0046">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16_rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6%2b"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:4.0:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16_rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6%2b</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:4.0:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0046</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T11:00:02.987-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:23.807-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html" xml:lang="en">FEDORA-2011-0741</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html" xml:lang="en">FEDORA-2011-0755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/3.2.9/" xml:lang="en">http://www.bugzilla.org/security/3.2.9/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2322" xml:lang="en">DSA-2322</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45982" xml:lang="en">45982</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0207" xml:lang="en">ADV-2011-0207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0271" xml:lang="en">ADV-2011-0271</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=621090" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=621090</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=621105" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=621105</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=621107" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=621107</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=621108" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=621108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=621109" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=621109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=621110" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=621110</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65003" xml:lang="en">bugzilla-unspec-csrf(65003)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site request forgery (CSRF) vulnerabilities in Bugzilla before 3.2.10, 3.4.x before 3.4.10, 3.6.x before 3.6.4, and 4.0.x before 4.0rc2 allow remote attackers to hijack the authentication of arbitrary users for requests related to (1) adding a saved search in buglist.cgi, (2) voting in votes.cgi, (3) sanity checking in sanitycheck.cgi, (4) creating or editing a chart in chart.cgi, (5) column changing in colchange.cgi, and (6) adding, deleting, or approving a quip in quips.cgi.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0047">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.3.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.4.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:alpha2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.5_r14348"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.11.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.14.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.14.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.16.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.16.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.16.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:stable_2003-08-29"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:stable_2003-11-07"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:stable_2003-11-17"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.1.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.2.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.9</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.10</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.11</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.12</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.13</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.14</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.3.15</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4:beta6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.9</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.10</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.11</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.12</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.13</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.4.14</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:alpha1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:alpha2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:beta4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:rc3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5:rc4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.5_r14348</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.9</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.10</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.12</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.8.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.9.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.10.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.11.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.14.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.14.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.14.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.15.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.16.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.16.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.16.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.16.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:stable_2003-08-29</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:stable_2003-11-07</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:stable_2003-11-17</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0047</vuln:cve-id>
    <vuln:published-datetime>2011-02-03T20:00:05.683-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:23.883-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" xml:lang="en">FEDORA-2011-5848</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" xml:lang="en">FEDORA-2011-5812</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" xml:lang="en">FEDORA-2011-5807</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html" xml:lang="en">[MediaWiki-announce] 20110201 MediaWiki security release 1.16.2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46108" xml:lang="en">46108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0273" xml:lang="en">ADV-2011-0273</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.wikimedia.org/show_bug.cgi?id=27093" xml:lang="en">https://bugzilla.wikimedia.org/show_bug.cgi?id=27093</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65126" xml:lang="en">mediawiki-css-comments-xss(65126)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.2 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) comments, aka "CSS injection vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0048">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16_rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6%2b"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.23.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:4.0:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16_rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6%2b</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.23.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.4.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:4.0:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0048</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T11:00:03.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:23.977-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html" xml:lang="en">FEDORA-2011-0741</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html" xml:lang="en">FEDORA-2011-0755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/3.2.9/" xml:lang="en">http://www.bugzilla.org/security/3.2.9/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2322" xml:lang="en">DSA-2322</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45982" xml:lang="en">45982</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0207" xml:lang="en">ADV-2011-0207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0271" xml:lang="en">ADV-2011-0271</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=628034" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=628034</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65005" xml:lang="en">bugzilla-url-xss(65005)</vuln:reference>
    </vuln:references>
    <vuln:summary>Bugzilla before 3.2.10, 3.4.x before 3.4.10, 3.6.x before 3.6.4, and 4.0.x before 4.0rc2 creates a clickable link for a (1) javascript: or (2) data: URI in the URL (aka bug_file_loc) field, which allows remote attackers to conduct cross-site scripting (XSS) attacks against logged-out users via a crafted URI.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0049">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110101"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110102"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110103"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110104"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110105"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110106"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110107"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110108"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110109"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110110"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110111"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110112"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110113"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110114"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110115"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110116"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110117"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110118"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110119"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110120"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110121"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110122"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110123"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110124"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110125"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110126"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110127"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110128"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110129"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110130"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110101</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110102</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110103</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110104</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110105</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110106</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110107</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110108</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110109</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110110</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110111</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110112</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110113</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110114</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110115</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110116</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110117</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110118</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110119</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110120</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110121</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110122</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110123</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110124</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110125</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110126</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110127</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110128</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110129</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110130</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0049</vuln:cve-id>
    <vuln:published-datetime>2011-02-03T20:00:07.400-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:23.653-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8061" xml:lang="en">8061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/16103" xml:lang="en">16103</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/363726" xml:lang="en">VU#363726</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516150/100/0/threaded" xml:lang="en">20110203 Majordomo2 - Directory Traversal (SMTP/HTTP)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46127" xml:lang="en">46127</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025024" xml:lang="en">1025024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0288" xml:lang="en">ADV-2011-0288</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bug628064.bugzilla.mozilla.org/attachment.cgi?id=506481" xml:lang="en">https://bug628064.bugzilla.mozilla.org/attachment.cgi?id=506481</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=628064" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=628064</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65113" xml:lang="en">majordomo-listfile-directory-traversal(65113)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://sitewat.ch/en/Advisory/View/1" xml:lang="en">https://sitewat.ch/en/Advisory/View/1</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in the _list_file_get function in lib/Majordomo.pm in Majordomo 2 before 20110131 allows remote attackers to read arbitrary files via .. (dot dot) sequences in the help command, as demonstrated using (1) a crafted email and (2) cgi-bin/mj_wwwusr in the web interface.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0050">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.3_pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.5b"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3_pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.3_pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:cgiirc:cgi%3airc:0.5.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.1</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.2</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.2.1</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.1</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.2</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.3</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.3_pre1</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.4</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.5</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.5b</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.6</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3.7</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3_pre1</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.3_pre2</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.4</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.4.1</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.4.2</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.4.3</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.1</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.2</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.3</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.4</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.5</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.6</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.7</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.8</vuln:product>
      <vuln:product>cpe:/a:cgiirc:cgi%3airc:0.5.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0050</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T20:00:01.933-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:24.887-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8097" xml:lang="en">8097</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://sourceforge.net/mailarchive/message.php?msg_id=27024589" xml:lang="en">[cgiirc-general] 20110207 CGI:IRC 0.5.10 released to fix XSS issue (CVE-2011-0050)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2158" xml:lang="en">DSA-2158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516328/100/0/threaded" xml:lang="en">20110209 CGI:IRC XSS issue (CVE-2011-0050)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0346" xml:lang="en">ADV-2011-0346</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the nonjs interface (interfaces/nonjs.pm) in CGI:IRC before 0.5.10 allows remote attackers to inject arbitrary web script or HTML via the R parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0051">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0051</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.380-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.333-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14211" name="oval:org.mitre.oval:def:14211"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100128655" xml:lang="en">http://support.avaya.com/css/P8/documents/100128655</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-02.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-02.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0312.html" xml:lang="en">RHSA-2011:0312</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0313.html" xml:lang="en">RHSA-2011:0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=616659" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=616659</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, does not properly handle certain recursive eval calls, which makes it easier for remote attackers to force a user to respond positively to a dialog question, as demonstrated by a question about granting privileges.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0053">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0053</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.410-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.427-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14379" name="oval:org.mitre.oval:def:14379"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100128655" xml:lang="en">http://support.avaya.com/css/P8/documents/100128655</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:042" xml:lang="en">MDVSA-2011:042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-01.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0312.html" xml:lang="en">RHSA-2011:0312</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0313.html" xml:lang="en">RHSA-2011:0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46645" xml:lang="en">46645</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=558531" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=558531</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=558541" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=558541</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=558633" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=558633</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=563243" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=563243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=563618" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=563618</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=576649" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=576649</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=596232" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=596232</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=600853" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=600853</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=600974" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=600974</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=602115" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=602115</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=605672" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=605672</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=613376" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=613376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=614499" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=614499</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0054">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0054</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.490-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.520-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14018" name="oval:org.mitre.oval:def:14018"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-04.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-04.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46648" xml:lang="en">46648</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=615657" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=615657</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving non-local JavaScript variables, aka an "upvarMap" issue.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0055">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0055</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.507-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.597-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14476" name="oval:org.mitre.oval:def:14476"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-03.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-03.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516802" xml:lang="en">20110302 ZDI-11-103: Mozilla Firefox JSON.stringify Dangling Pointer Remote Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46661" xml:lang="en">46661</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-103/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-103/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=616009" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=616009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=619255" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=619255</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the JSON.stringify method in js3250.dll in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via unspecified vectors related to the js_HasOwnProperty function and garbage collection.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0056">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0056</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.537-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.677-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14013" name="oval:org.mitre.oval:def:14013"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-05.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-05.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46650" xml:lang="en">46650</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=622015" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=622015</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving exception timing and a large number of string values, aka an "atom map" issue.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0057">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0057</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.567-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.770-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14200" name="oval:org.mitre.oval:def:14200"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-06.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-06.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46663" xml:lang="en">46663</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=626631" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=626631</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the Web Workers implementation in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to execute arbitrary code via vectors related to a JavaScript Worker and garbage collection.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0058">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0058</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.583-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.880-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14254" name="oval:org.mitre.oval:def:14254"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-07.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46660" xml:lang="en">46660</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=607160" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=607160</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0059">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0059</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.597-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:51.973-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14473" name="oval:org.mitre.oval:def:14473"/>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100128655" xml:lang="en">http://support.avaya.com/css/P8/documents/100128655</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-10.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-10.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0313.html" xml:lang="en">RHSA-2011:0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46652" xml:lang="en">46652</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=573873" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=573873</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0060">
    <vuln:cve-id>CVE-2011-0060</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.653-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.653-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0061">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0061</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.613-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.050-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14486" name="oval:org.mitre.oval:def:14486"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:042" xml:lang="en">MDVSA-2011:042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-09.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-09.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46651" xml:lang="en">46651</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=610601" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=610601</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0062">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0062</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T15:00:01.630-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14409" name="oval:org.mitre.oval:def:14409"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100133195" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100133195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:041" xml:lang="en">MDVSA-2011:041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:042" xml:lang="en">MDVSA-2011:042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-01.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46647" xml:lang="en">46647</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=569384" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=569384</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=599610" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=599610</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.14 and Thunderbird 3.1.x before 3.1.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0063">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110101"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110102"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110103"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110104"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110105"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110106"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110107"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110108"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110109"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110110"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110111"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110112"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110113"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110114"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110115"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110116"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110117"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110118"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110119"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110120"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110121"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110122"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110123"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110124"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110125"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110126"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110127"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110128"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110129"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110130"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110131"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110201"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110202"/>
        <cpe-lang:fact-ref name="cpe:/a:mj2:majordomo_2:20110203"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110101</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110102</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110103</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110104</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110105</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110106</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110107</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110108</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110109</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110110</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110111</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110112</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110113</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110114</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110115</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110116</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110117</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110118</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110119</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110120</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110121</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110122</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110123</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110124</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110125</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110126</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110127</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110128</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110129</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110130</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110131</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110201</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110202</vuln:product>
      <vuln:product>cpe:/a:mj2:majordomo_2:20110203</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0063</vuln:cve-id>
    <vuln:published-datetime>2011-03-15T13:55:02.937-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:25.480-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8133" xml:lang="en">8133</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://sotiriu.de/adv/NSOADV-2011-003.txt" xml:lang="en">http://sotiriu.de/adv/NSOADV-2011-003.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516923/100/0/threaded" xml:lang="en">20110308 NSOADV-2011-003: Majordomo2 'help' Command Directory Traversal (Patch Bypass)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=631307" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=631307</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66011" xml:lang="en">majordomo-listfileget-dir-traversal(66011)</vuln:reference>
    </vuln:references>
    <vuln:summary>The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences.  NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0064">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox"/>
        <cpe-lang:fact-ref name="cpe:/a:pango:pango:1.28.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox</vuln:product>
      <vuln:product>cpe:/a:pango:pango:1.28.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0064</vuln:cve-id>
    <vuln:published-datetime>2011-03-07T16:00:01.330-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.180-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9" xml:lang="en">http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2ed2cd307e7a991346faee164e70d9</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056065.html" xml:lang="en">FEDORA-2011-3194</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025145" xml:lang="en">1025145</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2178" xml:lang="en">DSA-2178</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:040" xml:lang="en">MDVSA-2011:040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0309.html" xml:lang="en">RHSA-2011:0309</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46632" xml:lang="en">46632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1082-1" xml:lang="en">USN-1082-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0543" xml:lang="en">ADV-2011-0543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0555" xml:lang="en">ADV-2011-0555</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0558" xml:lang="en">ADV-2011-0558</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0584" xml:lang="en">ADV-2011-0584</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0683" xml:lang="en">ADV-2011-0683</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=606997" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=606997</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/show_bug.cgi?id=672502" xml:lang="en">https://bugzilla.novell.com/show_bug.cgi?id=672502</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=678563" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=678563</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://build.opensuse.org/request/show/63070" xml:lang="en">https://build.opensuse.org/request/show/63070</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65770" xml:lang="en">pango-hbbufferensure-bo(65770)</vuln:reference>
    </vuln:references>
    <vuln:summary>The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0065">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0065</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:00.997-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.253-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14142" name="oval:org.mitre.oval:def:14142"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8326" xml:lang="en">8326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8331" xml:lang="en">8331</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8340" xml:lang="en">8340</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-13.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-13.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=634986" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=634986</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0066">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0066</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.043-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.333-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13970" name="oval:org.mitre.oval:def:13970"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-13.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-13.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=634983" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=634983</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mObserverList.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0067">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0067</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.090-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.427-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14523" name="oval:org.mitre.oval:def:14523"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-14.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-14.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=527935" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=527935</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly implement autocompletion for forms, which allows remote attackers to read form history entries via a Java applet that spoofs interaction with the autocomplete controls.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0069">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0069</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.120-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.520-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14065" name="oval:org.mitre.oval:def:14065"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47656" xml:lang="en">47656</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=644069" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=644069</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0070">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0070</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.167-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.613-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14286" name="oval:org.mitre.oval:def:14286"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47654" xml:lang="en">47654</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=645565" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=645565</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0071">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0071</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.197-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.723-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14058" name="oval:org.mitre.oval:def:14058"/>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-16.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-16.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=624764" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=624764</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 on Windows allows remote attackers to determine the existence of arbitrary files, and possibly load resources, via vectors involving a resource: URL.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0072">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0072</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.247-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.817-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14038" name="oval:org.mitre.oval:def:14038"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100134543" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100134543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47655" xml:lang="en">47655</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=624187" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=624187</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0073">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0073</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.293-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:52.910-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14020" name="oval:org.mitre.oval:def:14020"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100134543" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100134543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8310" xml:lang="en">8310</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-13.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-13.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=630919" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=630919</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly use nsTreeRange data structures, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0074">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0074</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.323-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.003-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14317" name="oval:org.mitre.oval:def:14317"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100134543" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100134543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47646" xml:lang="en">47646</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=619021" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=619021</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0075">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0075</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.357-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14086" name="oval:org.mitre.oval:def:14086"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100134543" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100134543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47647" xml:lang="en">47647</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=635977" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=635977</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0077, and CVE-2011-0078.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0076">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0076</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.387-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.207-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14498" name="oval:org.mitre.oval:def:14498"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-15.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-15.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=634724" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=634724</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=644682" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=644682</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, on Mac OS X allows remote attackers to bypass intended access restrictions via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0077">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0077</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.433-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.300-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14193" name="oval:org.mitre.oval:def:14193"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100134543" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100134543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47648" xml:lang="en">47648</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=623998" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=623998</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0078.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0078">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0078</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.463-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.397-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14246" name="oval:org.mitre.oval:def:14246"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100134543" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100134543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47651" xml:lang="en">47651</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=635705" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=635705</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0077.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0079">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0079</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.497-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.473-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14232" name="oval:org.mitre.oval:def:14232"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=601102" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=601102</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=639343" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=639343</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=639728" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=639728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=639885" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=639885</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=641388" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=641388</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=642717" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=642717</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=643649" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=643649</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x before 4.0.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to gfx/layers/d3d10/ReadbackManagerD3D10.cpp and unknown other vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0080">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0080</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.543-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.567-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13866" name="oval:org.mitre.oval:def:13866"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100134543" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100134543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47641" xml:lang="en">47641</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=615147" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=615147</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=634257" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=634257</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=637621" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=637621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=637957" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=637957</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=638236" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=638236</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0081">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0081</vuln:cve-id>
    <vuln:published-datetime>2011-05-07T14:55:01.573-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.630-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13993" name="oval:org.mitre.oval:def:13993"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird" xml:lang="en">http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_thunderbird</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.avaya.com/css/P8/documents/100144158" xml:lang="en">http://downloads.avaya.com/css/P8/documents/100144158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2227" xml:lang="en">DSA-2227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2228" xml:lang="en">DSA-2228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2235" xml:lang="en">DSA-2235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:079" xml:lang="en">MDVSA-2011:079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:080" xml:lang="en">MDVSA-2011:080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-12.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47653" xml:lang="en">47653</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=645289" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=645289</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0082">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0082</vuln:cve-id>
    <vuln:published-datetime>2011-06-06T15:55:01.317-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.707-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14145" name="oval:org.mitre.oval:def:14145"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627552" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627552</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/05/31/14" xml:lang="en">[oss-security] 20110531 Re: CVE request: firefox doesn't (re)validate certificates when loading HTTPS page</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/05/31/18" xml:lang="en">[oss-security] 20110531 Re: CVE request: firefox doesn't (re)validate certificates when loading HTTPS page</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/05/31/4" xml:lang="en">[oss-security] 20110531 CVE request: firefox doesn't (re)validate certificates when loading HTTPS page</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/05/31/9" xml:lang="en">[oss-security] 20110531 Re: CVE request: firefox doesn't (re)validate certificates when loading HTTPS page</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48064" xml:lang="en">48064</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=660749" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=660749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=709165" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=709165</vuln:reference>
    </vuln:references>
    <vuln:summary>The X.509 certificate validation functionality in Mozilla Firefox 4.0.x through 4.0.1 does not properly implement single-session security exceptions, which might make it easier for user-assisted remote attackers to spoof an SSL server via an untrusted certificate that triggers potentially unwanted local caching of documents from that server.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0083">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.14"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.17"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0083</vuln:cve-id>
    <vuln:published-datetime>2011-06-30T12:55:04.957-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.800-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13543" name="oval:org.mitre.oval:def:13543"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" xml:lang="en">SUSE-SA:2011:028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100144854" xml:lang="en">http://support.avaya.com/css/P8/documents/100144854</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100145333" xml:lang="en">http://support.avaya.com/css/P8/documents/100145333</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2268" xml:lang="en">DSA-2268</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2269" xml:lang="en">DSA-2269</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2273" xml:lang="en">DSA-2273</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:111" xml:lang="en">MDVSA-2011:111</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-23.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-23.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0885.html" xml:lang="en">RHSA-2011:0885</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0886.html" xml:lang="en">RHSA-2011:0886</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0887.html" xml:lang="en">RHSA-2011:0887</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0888.html" xml:lang="en">RHSA-2011:0888</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1149-1" xml:lang="en">USN-1149-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=648090" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=648090</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0084">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.19"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0:beta9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:5.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.1:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.1:alpha2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.1:alpha3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0:beta9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:4.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:5.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.1:alpha1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.1:alpha2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.1:alpha3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0084</vuln:cve-id>
    <vuln:published-datetime>2011-08-18T14:55:01.333-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:53.910-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14502" name="oval:org.mitre.oval:def:14502"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" xml:lang="en">SUSE-SA:2011:037</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00027.html" xml:lang="en">SUSE-SU-2011:0967</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2295" xml:lang="en">DSA-2295</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2296" xml:lang="en">DSA-2296</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2297" xml:lang="en">DSA-2297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:127" xml:lang="en">MDVSA-2011:127</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-29.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-29.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-30.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-30.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-31.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-31.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-33.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-33.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-1164.html" xml:lang="en">RHSA-2011:1164</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-1166.html" xml:lang="en">RHSA-2011:1166</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=648094" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=648094</vuln:reference>
    </vuln:references>
    <vuln:summary>The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0085">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:alpha_3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:2.0.14"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.6.17"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:3.1.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.6.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:alpha_3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:beta_2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:2.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.7.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.23</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:3.1.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0085</vuln:cve-id>
    <vuln:published-datetime>2011-06-30T12:55:04.987-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:54.020-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14432" name="oval:org.mitre.oval:def:14432"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" xml:lang="en">SUSE-SA:2011:028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100144854" xml:lang="en">http://support.avaya.com/css/P8/documents/100144854</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100145333" xml:lang="en">http://support.avaya.com/css/P8/documents/100145333</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2268" xml:lang="en">DSA-2268</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2269" xml:lang="en">DSA-2269</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2273" xml:lang="en">DSA-2273</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:111" xml:lang="en">MDVSA-2011:111</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2011/mfsa2011-23.html" xml:lang="en">http://www.mozilla.org/security/announce/2011/mfsa2011-23.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0885.html" xml:lang="en">RHSA-2011:0885</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0886.html" xml:lang="en">RHSA-2011:0886</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0887.html" xml:lang="en">RHSA-2011:0887</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0888.html" xml:lang="en">RHSA-2011:0888</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1149-1" xml:lang="en">USN-1149-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=648100" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=648100</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0086">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0086</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.320-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12070" name="oval:org.mitre.oval:def:12070"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46141" xml:lang="en">46141</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0325" xml:lang="en">ADV-2011-0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-012" xml:lang="en">MS11-012</vuln:reference>
    </vuln:references>
    <vuln:summary>win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Improper User Input Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0087">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0087</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.400-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12312" name="oval:org.mitre.oval:def:12312"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46148" xml:lang="en">46148</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0325" xml:lang="en">ADV-2011-0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-012" xml:lang="en">MS11-012</vuln:reference>
    </vuln:references>
    <vuln:summary>win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, and Server 2008 Gold and SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Insufficient User Input Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0088">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0088</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.493-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12553" name="oval:org.mitre.oval:def:12553"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46147" xml:lang="en">46147</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0325" xml:lang="en">ADV-2011-0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-012" xml:lang="en">MS11-012</vuln:reference>
    </vuln:references>
    <vuln:summary>win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Window Class Pointer Confusion Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0089">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0089</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.570-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11638" name="oval:org.mitre.oval:def:11638"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46149" xml:lang="en">46149</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0325" xml:lang="en">ADV-2011-0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-012" xml:lang="en">MS11-012</vuln:reference>
    </vuln:references>
    <vuln:summary>win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Window Class Improper Pointer Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0090">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0090</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:08.667-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12455" name="oval:org.mitre.oval:def:12455"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46150" xml:lang="en">46150</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0325" xml:lang="en">ADV-2011-0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-012" xml:lang="en">MS11-012</vuln:reference>
    </vuln:references>
    <vuln:summary>win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0091">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0091</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:13.723-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:21.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12498" name="oval:org.mitre.oval:def:12498"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/css/P8/documents/100127250" xml:lang="en">http://support.avaya.com/css/P8/documents/100127250</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46140" xml:lang="en">46140</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025048" xml:lang="en">1025048</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0326" xml:lang="en">ADV-2011-0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013" xml:lang="en">MS11-013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64901" xml:lang="en">ms-kerberos-spoofing(64901)</vuln:reference>
    </vuln:references>
    <vuln:summary>Kerberos in Microsoft Windows Server 2008 R2 and Windows 7 does not prevent a session from changing from strong encryption to DES encryption, which allows man-in-the-middle attackers to spoof network traffic and obtain sensitive information via a DES downgrade, aka "Kerberos Spoofing Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0092">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2002:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2007:sp2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:visio:2002:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2007:sp2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0092</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:31.833-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:23.837-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12403" name="oval:org.mitre.oval:def:12403"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516274/100/0/threaded" xml:lang="en">20110208 ZDI-11-063: Microsoft Visio 2007 LZW Stream Decompression Exception Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46137" xml:lang="en">46137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025043" xml:lang="en">1025043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0321" xml:lang="en">ADV-2011-0321</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-063/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-063/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-008" xml:lang="en">MS11-008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64923" xml:lang="en">ms-visio-object-code-execution(64923)</vuln:reference>
    </vuln:references>
    <vuln:summary>The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0093">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2002:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2007:sp2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:visio:2002:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2007:sp2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0093</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T11:00:31.863-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:24.900-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12469" name="oval:org.mitre.oval:def:12469"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46138" xml:lang="en">46138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025043" xml:lang="en">1025043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0321" xml:lang="en">ADV-2011-0321</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-008" xml:lang="en">MS11-008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64924" xml:lang="en">ms-visio-data-code-execution(64924)</vuln:reference>
    </vuln:references>
    <vuln:summary>ELEMENTS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 does not properly parse structures during the opening of a Visio file, which allows remote attackers to execute arbitrary code via a file containing a malformed structure, aka "Visio Data Type Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0094">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0094</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.047-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12463" name="oval:org.mitre.oval:def:12463"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=900" xml:lang="en">20110412 Microsoft Internet Explorer Use-After-Free Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025327" xml:lang="en">1025327</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018" xml:lang="en">MS11-018</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0095">
    <vuln:cve-id>CVE-2011-0095</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.667-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.667-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0096">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:r2::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0096</vuln:cve-id>
    <vuln:published-datetime>2011-01-31T15:00:49.173-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6956" name="oval:org.mitre.oval:def:6956"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/b/msrc/archive/2011/01/28/microsoft-releases-security-advisory-2501696.aspx" xml:lang="en">http://blogs.technet.com/b/msrc/archive/2011/01/28/microsoft-releases-security-advisory-2501696.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/b/srd/archive/2011/01/28/more-information-about-the-mhtml-script-injection-vulnerability.aspx" xml:lang="en">http://blogs.technet.com/b/srd/archive/2011/01/28/more-information-about-the-mhtml-script-injection-vulnerability.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.80vul.com/webzine_0x05/0x05%20IE%E4%B8%8BMHTML%E5%8D%8F%E8%AE%AE%E5%B8%A6%E6%9D%A5%E7%9A%84%E8%B7%A8%E5%9F%9F%E5%8D%B1%E5%AE%B3.html" xml:lang="en">http://www.80vul.com/webzine_0x05/0x05%20IE%E4%B8%8BMHTML%E5%8D%8F%E8%AE%AE%E5%B8%A6%E6%9D%A5%E7%9A%84%E8%B7%A8%E5%9F%9F%E5%8D%B1%E5%AE%B3.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/16071" xml:lang="en">16071</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/326549" xml:lang="en">VU#326549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.microsoft.com/technet/security/advisory/2501696.mspx" xml:lang="en">http://www.microsoft.com/technet/security/advisory/2501696.mspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46055" xml:lang="en">46055</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025003" xml:lang="en">1025003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0242" xml:lang="en">ADV-2011-0242</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-026" xml:lang="en">MS11-026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65000" xml:lang="en">ms-win-mhtml-info-disclosure(65000)</vuln:reference>
    </vuln:references>
    <vuln:summary>The MHTML protocol handler in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle a MIME format in a request for content blocks in a document, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site that is visited in Internet Explorer, aka "MHTML Mime-Formatted Request Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0097">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:-:-:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2010"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel_viewer:-:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:excel:-:-:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2010</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel_viewer:-:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0097</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.080-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:27.790-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12612" name="oval:org.mitre.oval:def:12612"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47201" xml:lang="en">47201</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025337" xml:lang="en">1025337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0940" xml:lang="en">ADV-2011-0940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021" xml:lang="en">MS11-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer underflow in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via a crafted 400h substream in an Excel file, which triggers a stack-based buffer overflow, aka "Excel Integer Overrun Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0098">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:-:-:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2010"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel_viewer:-:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:excel:-:-:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2010</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel_viewer:-:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0098</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.127-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:28.633-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12034" name="oval:org.mitre.oval:def:12034"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47235" xml:lang="en">47235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025337" xml:lang="en">1025337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0940" xml:lang="en">ADV-2011-0940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021" xml:lang="en">MS11-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer signedness error in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via an XLS file with a large record size, aka "Excel Heap Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0099">
    <vuln:cve-id>CVE-2011-0099</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.683-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.683-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0100">
    <vuln:cve-id>CVE-2011-0100</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.713-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.713-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0101">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2002:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:excel:2002:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0101</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.157-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:29.463-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11676" name="oval:org.mitre.oval:def:11676"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/517463/100/0/threaded" xml:lang="en">20110412 ZDI-11-120: Microsoft Office Excel RealTimeData Record Parsing Remote Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47243" xml:lang="en">47243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025337" xml:lang="en">1025337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0940" xml:lang="en">ADV-2011-0940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-120" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021" xml:lang="en">MS11-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RealTimeData record, related to a stTopic field, double-byte characters, and an incorrect pointer calculation, aka "Excel Record Parsing WriteAV Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0102">
    <vuln:cve-id>CVE-2011-0102</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.730-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.730-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0103">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:excel:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0103</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:30.447-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12616" name="oval:org.mitre.oval:def:12616"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=901" xml:lang="en">20110412 Microsoft Excel Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47244" xml:lang="en">47244</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025337" xml:lang="en">1025337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0940" xml:lang="en">ADV-2011-0940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021" xml:lang="en">MS11-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted record information in an Excel file, aka "Excel Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0104">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:excel:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0104</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.220-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:31.260-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11767" name="oval:org.mitre.oval:def:11767"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.checkpoint.com/defense/advisories/public/2011/cpai-31-Mard.html" xml:lang="en">http://www.checkpoint.com/defense/advisories/public/2011/cpai-31-Mard.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47245" xml:lang="en">47245</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025337" xml:lang="en">1025337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0940" xml:lang="en">ADV-2011-0940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021" xml:lang="en">MS11-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HLink record in an Excel file, aka "Excel Buffer Overwrite Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0105">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:excel:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0105</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:32.087-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12618" name="oval:org.mitre.oval:def:12618"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025337" xml:lang="en">1025337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0940" xml:lang="en">ADV-2011-0940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021" xml:lang="en">MS11-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac obtain a certain length value from an uninitialized memory location, which allows remote attackers to trigger a buffer overflow and execute arbitrary code via a crafted Excel file, aka "Excel Data Initialization Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0106">
    <vuln:cve-id>CVE-2011-0106</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.747-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.760-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0107">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0107</vuln:cve-id>
    <vuln:published-datetime>2011-04-13T14:55:01.283-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:59:32.633-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12655" name="oval:org.mitre.oval:def:12655"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortiguard.com/advisory/FGA-2011-13.html" xml:lang="en">http://www.fortiguard.com/advisory/FGA-2011-13.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47246" xml:lang="en">47246</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025343" xml:lang="en">1025343</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0942" xml:lang="en">ADV-2011-0942</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023" xml:lang="en">MS11-023</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in Microsoft Office XP SP3, Office 2003 SP3, and Office 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Office Component Insecure Library Loading Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0108">
    <vuln:cve-id>CVE-2011-0108</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.777-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.777-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0109">
    <vuln:cve-id>CVE-2011-0109</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.807-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.823-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0110">
    <vuln:cve-id>CVE-2011-0110</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:12.840-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:12.840-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2011. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0111">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0111</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.457-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.147-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17172" name="oval:org.mitre.oval:def:17172"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0112">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0112</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.520-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.270-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16959" name="oval:org.mitre.oval:def:16959"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0113">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0113</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.550-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.333-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17070" name="oval:org.mitre.oval:def:17070"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0114">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0114</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.583-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.410-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16903" name="oval:org.mitre.oval:def:16903"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0115">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0115</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.613-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-17T22:56:29.617-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-096" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-096</vuln:reference>
    </vuln:references>
    <vuln:summary>The DOM level 2 implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, does not properly handle DOM manipulations associated with event listeners during processing of range objects, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0116">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0116</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.643-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.473-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17220" name="oval:org.mitre.oval:def:17220"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-097" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-097</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the setOuterText method in the htmlelement library in WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to DOM manipulations during iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0117">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0117</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.677-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17250" name="oval:org.mitre.oval:def:17250"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0118">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0118</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.707-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.597-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17327" name="oval:org.mitre.oval:def:17327"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0119">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0119</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.723-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.677-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17254" name="oval:org.mitre.oval:def:17254"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0120">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0120</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.737-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.787-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17373" name="oval:org.mitre.oval:def:17373"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0121">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0121</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.753-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.847-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17374" name="oval:org.mitre.oval:def:17374"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0122">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0122</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.770-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:55.927-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17372" name="oval:org.mitre.oval:def:17372"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0123">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0123</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.800-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.020-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17018" name="oval:org.mitre.oval:def:17018"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0124">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0124</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.817-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17280" name="oval:org.mitre.oval:def:17280"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0125">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0125</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.833-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.160-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17092" name="oval:org.mitre.oval:def:17092"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0126">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0126</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.847-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.240-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16788" name="oval:org.mitre.oval:def:16788"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0127">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0127</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.863-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.300-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17247" name="oval:org.mitre.oval:def:17247"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0128">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0128</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.893-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.380-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17394" name="oval:org.mitre.oval:def:17394"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0129">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0129</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.910-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.443-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17161" name="oval:org.mitre.oval:def:17161"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0130">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0130</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.927-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.520-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16568" name="oval:org.mitre.oval:def:16568"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0131">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0131</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.957-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.597-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17094" name="oval:org.mitre.oval:def:17094"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0132">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0132</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.973-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-17T22:56:32.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-098" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-098</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the Runin box functionality in the Cascading Style Sheets (CSS) 2.1 Visual Formatting Model implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0133">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0133</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:01.987-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.660-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17072" name="oval:org.mitre.oval:def:17072"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-099" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-099</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, does not properly access glyph data during layout actions for floating blocks associated with pseudo-elements, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0134">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0134</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.020-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.880-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17059" name="oval:org.mitre.oval:def:17059"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0135">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0135</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.037-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:56.957-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17167" name="oval:org.mitre.oval:def:17167"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0136">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0136</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.050-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.020-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17222" name="oval:org.mitre.oval:def:17222"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0137">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0137</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.067-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.083-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16457" name="oval:org.mitre.oval:def:16457"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0138">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0138</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.083-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.160-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17452" name="oval:org.mitre.oval:def:17452"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0139">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0139</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.113-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.270-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17446" name="oval:org.mitre.oval:def:17446"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0140">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0140</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.127-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.333-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17378" name="oval:org.mitre.oval:def:17378"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0141">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0141</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.143-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.397-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16730" name="oval:org.mitre.oval:def:16730"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0142">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0142</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.177-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.473-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17104" name="oval:org.mitre.oval:def:17104"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0143">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0143</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.190-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.550-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17413" name="oval:org.mitre.oval:def:17413"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0144">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0144</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.207-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.630-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17312" name="oval:org.mitre.oval:def:17312"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0145">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0145</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.223-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.693-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17127" name="oval:org.mitre.oval:def:17127"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0146">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0146</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.253-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.753-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16843" name="oval:org.mitre.oval:def:16843"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0147">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0147</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.270-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.833-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16488" name="oval:org.mitre.oval:def:16488"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0148">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0148</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.287-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.897-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16916" name="oval:org.mitre.oval:def:16916"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0149">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0149</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.317-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:57.957-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17241" name="oval:org.mitre.oval:def:17241"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-100" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-100</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, does not properly parse HTML elements associated with document namespaces, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to a "dangling pointer" and iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0150">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0150</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.333-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.037-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17339" name="oval:org.mitre.oval:def:17339"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0151">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0151</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.363-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17397" name="oval:org.mitre.oval:def:17397"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0152">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0152</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.207-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12519" name="oval:org.mitre.oval:def:12519"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0153">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0153</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.393-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.317-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17218" name="oval:org.mitre.oval:def:17218"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0154">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0154</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.410-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.397-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17308" name="oval:org.mitre.oval:def:17308"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-101" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-101</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows and Apple iOS, does not properly implement the .sort function for JavaScript arrays, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0155">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0155</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.440-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.473-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17299" name="oval:org.mitre.oval:def:17299"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0156">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0156</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.457-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.550-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17191" name="oval:org.mitre.oval:def:17191"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0157">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0157</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:02.543-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.493-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46807" xml:lang="en">46807</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66007" xml:lang="en">appleios-webkit-unspec-code-exec(66007)</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iOS before 4.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-09-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0158">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0158</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:02.637-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.557-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46806" xml:lang="en">46806</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025182" xml:lang="en">1025182</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66002" xml:lang="en">appleios-mobilesafari-dos(66002)</vuln:reference>
    </vuln:references>
    <vuln:summary>MobileSafari in Apple iOS before 4.3 does not properly implement application launching through URL handlers, which allows remote attackers to cause a denial of service (persistent application crash) via crafted JavaScript code.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0159">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0159</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:02.747-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:13.860-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46810" xml:lang="en">46810</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025182" xml:lang="en">1025182</vuln:reference>
    </vuln:references>
    <vuln:summary>The Safari Settings feature in Safari in Apple iOS 4.x before 4.3 does not properly implement the clearing of cookies during execution of the Safari application, which might make it easier for remote web servers to track users by setting a cookie.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0160">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0160</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:02.840-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:14.220-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025182" xml:lang="en">1025182</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.4 and iOS before 4.3, does not properly handle redirects in conjunction with HTTP Basic Authentication, which might allow remote web servers to capture credentials by logging the Authorization HTTP header.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0161">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0161</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:02.947-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.617-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46814" xml:lang="en">46814</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025182" xml:lang="en">1025182</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66000" xml:lang="en">appleios-attr-code-execution(66000)</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.4 and iOS before 4.3, does not properly handle the Attr.style accessor, which allows remote attackers to bypass the Same Origin Policy and inject Cascading Style Sheets (CSS) token sequences via a crafted web site.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0162">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:apple_tv:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:tvos:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:tvos:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:tvos:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:tvos:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:tvos:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:tvos:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:tvos:3.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:apple_tv:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
      <vuln:product>cpe:/o:apple:tvos:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:tvos:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:tvos:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:tvos:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:tvos:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:tvos:2.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:tvos:3.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0162</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:03.057-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-08T11:06:25.590-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html" xml:lang="en">APPLE-SA-2011-03-09-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4565" xml:lang="en">http://support.apple.com/kb/HT4565</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46813" xml:lang="en">46813</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025182" xml:lang="en">1025182</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65998" xml:lang="en">appleios-wifi-dos(65998)</vuln:reference>
    </vuln:references>
    <vuln:summary>Wi-Fi in Apple iOS before 4.3 and Apple TV before 4.2 does not properly perform bounds checking for Wi-Fi frames, which allows remote attackers to cause a denial of service (device reset) via unspecified traffic on the local wireless network.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0163">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0163</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:03.167-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.777-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025182" xml:lang="en">1025182</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66001" xml:lang="en">appleios-cache-dos(66001)</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.4 and iOS before 4.3, does not properly handle unspecified "cached resources," which allows remote attackers to cause a denial of service (resource unavailability) via a crafted web site that conducts a cache-poisoning attack.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0164">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0164</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.487-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.630-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17482" name="oval:org.mitre.oval:def:17482"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0165">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0165</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.503-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.707-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16871" name="oval:org.mitre.oval:def:16871"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0166">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0166</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:03.277-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.837-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46811" xml:lang="en">46811</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025183" xml:lang="en">1025183</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66004" xml:lang="en">apple-safari-html5-info-disclosure(66004)</vuln:reference>
    </vuln:references>
    <vuln:summary>The HTML5 drag and drop functionality in WebKit in Apple Safari before 5.0.4 allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information via vectors related to the dragging of content.  NOTE: this might overlap CVE-2011-0778.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0167">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0167</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:03.340-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:16.237-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46816" xml:lang="en">46816</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025183" xml:lang="en">1025183</vuln:reference>
    </vuln:references>
    <vuln:summary>The windows functionality in WebKit in Apple Safari before 5.0.4 allows remote attackers to bypass the Same Origin Policy, and force the upload of arbitrary local files from a client computer, via a crafted web site.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0168">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0168</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.520-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.787-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16938" name="oval:org.mitre.oval:def:16938"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0169">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0169</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T17:55:03.400-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.900-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46809" xml:lang="en">46809</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025183" xml:lang="en">1025183</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66006" xml:lang="en">safari-commandlineapi-xss(66006)</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit in Apple Safari before 5.0.4, when the Web Inspector is used, does not properly handle the window.console._inspectorCommandLineAPI property, which allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted web site.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0170">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0170</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.597-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.847-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17367" name="oval:org.mitre.oval:def:17367"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=897" xml:lang="en">20110302 Apple CoreGraphics Library Heap Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in ImageIO in CoreGraphics in Apple iTunes before 10.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted International Color Consortium (ICC) profile in a JPEG image.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0172">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0172</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.033-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:02:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>AirPort in Apple Mac OS X 10.6 before 10.6.7 allows remote attackers to cause a denial of service (divide-by-zero error and reboot) via Wi-Fi frames on the local wireless network, a different vulnerability than CVE-2011-0162.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0173">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:applescript"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:applescript"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:applescript</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0173</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.050-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:16:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-134"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple format string vulnerabilities in AppleScript in Apple Mac OS X before 10.6.7 allow context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a (1) display dialog or (2) display alert command in a dialog in an AppleScript Studio application.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0174">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0174</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.080-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:19:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X before 10.6.7 allows remote attackers to execute arbitrary code via a document that contains a crafted embedded OpenType font.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0175">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0175</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.110-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T14:35:31.500-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:28:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in Apple Type Services (ATS) in Apple Mac OS X before 10.6.7 allow remote attackers to execute arbitrary code via a document that contains a crafted embedded TrueType font.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0176">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0176</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.143-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:32:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in Apple Type Services (ATS) in Apple Mac OS X before 10.6.7 allow remote attackers to execute arbitrary code via a document that contains a crafted embedded Type 1 font.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0177">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0177</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.157-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:35:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in Apple Type Services (ATS) in Apple Mac OS X before 10.6.7 allow remote attackers to execute arbitrary code via a document that contains a crafted SFNT table in an embedded font.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0178">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:carboncore"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:carboncore"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:carboncore</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0178</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.173-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:38:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>The FSFindFolder API in CarbonCore in Apple Mac OS X before 10.6.7 provides a world-readable directory in response to a call with the kTemporaryFolderType flag, which allows local users to obtain potentially sensitive information by accessing this directory.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0179">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0179</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.207-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:40:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>CoreText in Apple Mac OS X before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a document that contains a crafted embedded font.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0180">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0180</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.220-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:42:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in HFS in Apple Mac OS X before 10.6.7 allows local users to read arbitrary (1) HFS, (2) HFS+, or (3) HFS+J files via a crafted F_READBOOTSTRAP ioctl call.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0181">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:imageio</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0181</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:04.237-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-06-27T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T10:44:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in ImageIO in Apple Mac OS X before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted XBM image.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0182">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0182</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:05.393-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-02-13T23:03:22.353-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8402" xml:lang="en">8402</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>The i386_set_ldt system call in the kernel in Apple Mac OS X before 10.6.7 does not properly handle call gates, which allows local users to gain privileges via vectors involving the creation of a call gate entry.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0183">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0183</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:05.407-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T11:04:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Libinfo in Apple Mac OS X before 10.6.7 does not properly handle an unspecified integer field in an NFS RPC packet, which allows remote attackers to cause a denial of service (lockd, statd, mountd, or portmap outage) via a crafted packet, related to an "integer truncation issue."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0184">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0184</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:05.423-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T11:09:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=898" xml:lang="en">20110321 Apple OfficeImport Framework Excel Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>QuickLook in Apple Mac OS X 10.6 before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via an Excel spreadsheet with a crafted formula that uses unspecified opcodes.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0185">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0185</vuln:cve-id>
    <vuln:published-datetime>2011-10-14T06:55:07.650-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-01-13T22:51:23.773-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.4</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-134"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50085" xml:lang="en">50085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50092" xml:lang="en">50092</vuln:reference>
    </vuln:references>
    <vuln:summary>Format string vulnerability in the debug-logging feature in Application Firewall in Apple Mac OS X before 10.7.2 allows local users to gain privileges via a crafted name of an executable file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0186">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0186</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:05.440-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-08-10T22:48:27.877-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>QuickTime in Apple Mac OS X before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG2000 image.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0187">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0187</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:05.457-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:26.897-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:summary>The plug-in in QuickTime in Apple Mac OS X before 10.6.7 allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive video data via vectors involving a cross-site redirect.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0188">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9:r18423"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.0:r18423"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.0-0"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.0-1"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.0-2"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.0-20060415"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.0-20070709"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-p0"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-p129"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-p243"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-p376"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-p429"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-preview_1"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-preview_2"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-rc1"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.1:-rc2"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.2:dev"/>
          <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9.2-p136"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9:r18423</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.0</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.0:r18423</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.0-0</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.0-1</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.0-2</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.0-20060415</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.0-20070709</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-p0</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-p129</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-p243</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-p376</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-p429</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-preview_1</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-preview_2</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-rc1</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.1:-rc2</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.2</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.2:dev</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9.2-p136</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0188</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:06.110-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-08-23T23:15:07.243-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364&amp;r2=30993" xml:lang="en">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364&amp;r2=30993</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:097" xml:lang="en">MDVSA-2011:097</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:098" xml:lang="en">MDVSA-2011:098</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0908.html" xml:lang="en">RHSA-2011:0908</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0909.html" xml:lang="en">RHSA-2011:0909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0910.html" xml:lang="en">RHSA-2011:0910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025236" xml:lang="en">1025236</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=682332" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=682332</vuln:reference>
    </vuln:references>
    <vuln:summary>The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0189">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:terminal"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:terminal"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:terminal</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0189</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:06.143-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-23T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T11:47:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0190">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:installer"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:installer"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:installer</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0190</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:06.157-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-23T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T11:51:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Install Helper in Installer in Apple Mac OS X before 10.6.7 does not properly process an unspecified URL, which might allow remote attackers to track user logins by logging network traffic from an agent that was intended to send network traffic to an Apple server.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0191">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0191</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2014-02-20T23:39:23.877-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html" xml:lang="en">APPLE-SA-2011-03-09-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" xml:lang="en">SUSE-SR:2011:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4565" xml:lang="en">http://support.apple.com/kb/HT4565</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2210" xml:lang="en">DSA-2210</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:064" xml:lang="en">MDVSA-2011:064</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46657" xml:lang="en">46657</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0845" xml:lang="en">ADV-2011-0845</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0859" xml:lang="en">ADV-2011-0859</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0192">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0192</vuln:cve-id>
    <vuln:published-datetime>2011-03-03T15:00:02.643-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2014-02-20T23:39:24.093-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blackberry.com/btsc/KB27244" xml:lang="en">http://blackberry.com/btsc/KB27244</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html" xml:lang="en">APPLE-SA-2011-03-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" xml:lang="en">APPLE-SA-2011-03-09-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Mar/msg00005.html" xml:lang="en">APPLE-SA-2011-03-09-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" xml:lang="en">APPLE-SA-2011-10-12-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" xml:lang="en">APPLE-SA-2011-03-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057763.html" xml:lang="en">FEDORA-2011-3836</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057840.html" xml:lang="en">FEDORA-2011-3827</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055240.html" xml:lang="en">FEDORA-2011-2540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055683.html" xml:lang="en">FEDORA-2011-2498</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" xml:lang="en">SUSE-SR:2011:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-201209-02.xml" xml:lang="en">GLSA-201209-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2011&amp;m=slackware-security.587820" xml:lang="en">SSA:2011-098-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4554" xml:lang="en">http://support.apple.com/kb/HT4554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4564" xml:lang="en">http://support.apple.com/kb/HT4564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4565" xml:lang="en">http://support.apple.com/kb/HT4565</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4566" xml:lang="en">http://support.apple.com/kb/HT4566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5001" xml:lang="en">http://support.apple.com/kb/HT5001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2210" xml:lang="en">DSA-2210</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:043" xml:lang="en">MDVSA-2011:043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0318.html" xml:lang="en">RHSA-2011:0318</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46658" xml:lang="en">46658</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025153" xml:lang="en">1025153</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0551" xml:lang="en">ADV-2011-0551</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0599" xml:lang="en">ADV-2011-0599</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0621" xml:lang="en">ADV-2011-0621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0845" xml:lang="en">ADV-2011-0845</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0905" xml:lang="en">ADV-2011-0905</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0930" xml:lang="en">ADV-2011-0930</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0960" xml:lang="en">ADV-2011-0960</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=678635" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=678635</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0193">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0193</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:06.173-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-23T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T11:54:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in Image RAW in Apple Mac OS X before 10.6.7 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Canon RAW image.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0194">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:imageio</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0194</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T22:00:06.190-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-23T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-23T11:57:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" xml:lang="en">APPLE-SA-2011-03-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4581" xml:lang="en">http://support.apple.com/kb/HT4581</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in ImageIO in Apple Mac OS X 10.6 before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0195">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0195</vuln:cve-id>
    <vuln:published-datetime>2011-04-15T15:55:00.653-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-22T22:39:11.990-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html" xml:lang="en">APPLE-SA-2011-04-14-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025365" xml:lang="en">1025365</vuln:reference>
    </vuln:references>
    <vuln:summary>The generate-id XPath function in libxslt in Apple iOS 4.3.x before 4.3.2 allows remote attackers to obtain potentially sensitive information about heap memory addresses via a crafted web site.  NOTE: this may overlap CVE-2011-1202.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0196">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0196</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:01.983-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-06-27T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-06-27T08:52:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:summary>AirPort in Apple Mac OS X 10.5.8 allows remote attackers to cause a denial of service (out-of-bounds read and reboot) via Wi-Fi frames on the local wireless network.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0197">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0197</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.030-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:46.090-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48443" xml:lang="en">48443</vuln:reference>
    </vuln:references>
    <vuln:summary>App Store in Apple Mac OS X before 10.6.8 creates a log entry containing a user's AppleID password, which might allow local users to obtain sensitive information by reading a log file, as demonstrated by a log file that has non-default permissions.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0198">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0198</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.077-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:46.230-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48436" xml:lang="en">48436</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code via a crafted embedded TrueType font.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0199">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0199</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.137-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:46.387-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48447" xml:lang="en">48447</vuln:reference>
    </vuln:references>
    <vuln:summary>The Certificate Trust Policy component in Apple Mac OS X before 10.6.8 does not perform CRL checking for Extended Validation (EV) certificates that lack OCSP URLs, which might allow man-in-the-middle attackers to spoof an SSL server via a revoked certificate.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0200">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0200</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-02-03T22:56:15.797-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" xml:lang="en">APPLE-SA-2012-02-01-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5130" xml:lang="en">http://support.apple.com/kb/HT5130</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in ColorSync in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an image containing a crafted embedded ColorSync profile that triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0201">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0201</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-22T22:39:12.693-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:summary>Off-by-one error in the CoreFoundation framework in Apple Mac OS X before 10.6.8 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a CFString object that triggers a buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0202">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0202</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.247-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-22T22:39:12.847-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in CoreGraphics in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted embedded Type 1 font in a PDF document.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0203">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0203</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:46.870-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48418" xml:lang="en">48418</vuln:reference>
    </vuln:references>
    <vuln:summary>Absolute path traversal vulnerability in xftpd in the FTP Server component in Apple Mac OS X before 10.6.8 allows remote attackers to list arbitrary directories by using the root directory as the starting point of a recursive listing.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0204">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:imageio</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0204</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-11-23T22:54:58.443-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2011-07/0034.html" xml:lang="en">20110628 NGS00062 Patch Notification: Apple Mac OS X ImageIO TIFF Heap Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in ImageIO in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0205">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:imageio</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0205</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.357-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:47.120-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48439" xml:lang="en">48439</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in ImageIO in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG2000 image.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0206">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0206</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.387-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:24.963-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/68217" xml:lang="en">macos-icu-bo(68217)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in International Components for Unicode (ICU) in Apple Mac OS X before 10.6.8 allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving uppercase strings.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0207">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0207</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:47.370-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48444" xml:lang="en">48444</vuln:reference>
    </vuln:references>
    <vuln:summary>The MobileMe component in Apple Mac OS X before 10.6.8 uses a cleartext HTTP session for the Mail application to read e-mail aliases, which allows remote attackers to obtain potentially sensitive alias information by sniffing the network.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0208">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0208</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.467-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:29.117-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>QuickLook in Apple Mac OS X 10.6 before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office document.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0209">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0209</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.497-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-08-10T22:48:30.797-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in QuickTime in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted RIFF WAV file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0210">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0210</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.530-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:47.730-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48442" xml:lang="en">48442</vuln:reference>
    </vuln:references>
    <vuln:summary>QuickTime in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted sample tables in a movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0211">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0211</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.560-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-08-10T22:48:31.140-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in QuickTime in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0212">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0212</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.590-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-26T23:21:47.980-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48445" xml:lang="en">48445</vuln:reference>
    </vuln:references>
    <vuln:summary>servermgrd in Apple Mac OS X before 10.6.8 allows remote attackers to read arbitrary files, and possibly send HTTP requests to intranet servers or cause a denial of service (CPU and memory consumption), via an XML-RPC request containing an entity declaration in conjunction with an entity reference, related to an XML External Entity (aka XXE) issue.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0213">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0213</vuln:cve-id>
    <vuln:published-datetime>2011-06-24T16:55:02.623-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-08-10T22:48:31.407-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" xml:lang="en">APPLE-SA-2011-06-23-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4723" xml:lang="en">http://support.apple.com/kb/HT4723</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in QuickTime in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0214">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:cfnetwork"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cfnetwork</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0214</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:01.723-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-22T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-07-22T09:14:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:summary>CFNetwork in Apple Safari before 5.0.6 on Windows does not properly handle an untrusted attribute of a system root certificate, which allows remote web servers to bypass intended SSL restrictions via a certificate signed by a blacklisted certification authority.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0215">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:imageio</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0215</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:01.770-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-13T22:50:00.370-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:summary>ImageIO in Apple Safari before 5.0.6 on Windows does not properly address re-entrancy issues, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0216">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0216</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:01.800-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2013-02-06T23:40:19.890-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" xml:lang="en">APPLE-SA-2011-10-12-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2013-0217.html" xml:lang="en">RHSA-2013:0217</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5001" xml:lang="en">http://support.apple.com/kb/HT5001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2012/dsa-2394" xml:lang="en">DSA-2394</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:188" xml:lang="en">MDVSA-2011:188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-1749.html" xml:lang="en">RHSA-2011:1749</vuln:reference>
    </vuln:references>
    <vuln:summary>Off-by-one error in libxml in Apple Safari before 5.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via a crafted web site.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0217">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0217</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:01.847-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-22T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-07-22T09:33:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple Safari before 5.0.6 provides AutoFill information to scripts that execute before HTML form submission, which allows remote attackers to obtain Address Book information via a crafted form, as demonstrated by a form that includes non-visible fields.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0218">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0218</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:01.897-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:30.210-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0219">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0219</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:01.927-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-22T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-07-22T10:02:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple Safari before 5.0.6 allows remote attackers to bypass the Same Origin Policy, and modify the rendering of text from arbitrary web sites, via a Java applet that loads fonts.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0221">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0221</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:01.973-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:30.460-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0222">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0222</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.003-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:30.600-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8313" xml:lang="en">8313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8315" xml:lang="en">8315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0223">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0223</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.037-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-13T22:50:01.370-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0224">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0224</vuln:cve-id>
    <vuln:published-datetime>2011-10-14T06:55:07.730-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-01-13T22:51:27.587-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50085" xml:lang="en">50085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50095" xml:lang="en">50095</vuln:reference>
    </vuln:references>
    <vuln:summary>CoreMedia in Apple Mac OS X through 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted QuickTime movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0225">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0225</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.067-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:31.023-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0226">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.2.10"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.3"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.4"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.6"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.7"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.8"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.9"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.10"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.11"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.3.12"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.4.4"/>
          <cpe-lang:fact-ref name="cpe:/a:freetype:freetype:2.4.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:freetype:freetype:2.2.1</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.2.10</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.0</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.1</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.2</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.3</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.4</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.5</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.6</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.7</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.8</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.9</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.10</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.11</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.3.12</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.4.0</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.4.1</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.4.2</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.4.3</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.4.4</vuln:product>
      <vuln:product>cpe:/a:freetype:freetype:2.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0226</vuln:cve-id>
    <vuln:published-datetime>2011-07-19T18:55:00.820-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-25T22:56:19.090-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html" xml:lang="en">APPLE-SA-2011-07-15-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html" xml:lang="en">APPLE-SA-2011-07-15-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00014.html" xml:lang="en">[freetype-devel] 20110708 details on iPhone exploit caused by FreeType?</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00015.html" xml:lang="en">[freetype-devel] 20110708 Re: details on iPhone exploit caused by FreeType?</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00020.html" xml:lang="en">[freetype-devel] 20110709 Re: details on iPhone exploit caused by FreeType?</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00026.html" xml:lang="en">[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.nongnu.org/archive/html/freetype-devel/2011-07/msg00028.html" xml:lang="en">[freetype-devel] 20110711 Re: details on iPhone exploit caused by FreeType?</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html" xml:lang="en">openSUSE-SU-2011:0852</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html" xml:lang="en">SUSE-SU-2011:0853</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4802" xml:lang="en">http://support.apple.com/kb/HT4802</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4803" xml:lang="en">http://support.apple.com/kb/HT4803</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html" xml:lang="en">http://www.appleinsider.com/articles/11/07/06/hackers_release_new_browser_based_ios_jailbreak_based_on_pdf_exploit.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2294" xml:lang="en">DSA-2294</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:120" xml:lang="en">MDVSA-2011:120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-1085.html" xml:lang="en">RHSA-2011:1085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48619" xml:lang="en">48619</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0227">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0227</vuln:cve-id>
    <vuln:published-datetime>2011-07-19T18:55:00.883-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-26T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-07-20T11:21:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00000.html" xml:lang="en">APPLE-SA-2011-07-15-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00001.html" xml:lang="en">APPLE-SA-2011-07-15-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4802" xml:lang="en">http://support.apple.com/kb/HT4802</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4803" xml:lang="en">http://support.apple.com/kb/HT4803</vuln:reference>
    </vuln:references>
    <vuln:summary>The queueing primitives in IOMobileFrameBuffer in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 do not properly perform type conversion, which allows local users to gain privileges via a crafted application.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0228">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.2.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:iphone_os:4.3.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:1.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:2.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:3.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.2.9</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:iphone_os:4.3.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0228</vuln:cve-id>
    <vuln:published-datetime>2011-08-29T16:55:00.753-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:28.027-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00004.html" xml:lang="en">APPLE-SA-2011-07-25-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00005.html" xml:lang="en">APPLE-SA-2011-07-25-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8361" xml:lang="en">8361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025837" xml:lang="en">1025837</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4824" xml:lang="en">http://support.apple.com/kb/HT4824</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4825" xml:lang="en">http://support.apple.com/kb/HT4825</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/518982/100/0/threaded" xml:lang="en">20110725 TWSL2011-007: iOS SSL Implementation Does Not Validate Certificate Chain</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48877" xml:lang="en">48877</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://www.trustwave.com/spiderlabs/advisories/TWSL2011-007.txt" xml:lang="en">https://www.trustwave.com/spiderlabs/advisories/TWSL2011-007.txt</vuln:reference>
    </vuln:references>
    <vuln:summary>The Data Security component in Apple iOS before 4.2.10 and 4.3.x before 4.3.5 does not check the basicConstraints parameter during validation of X.509 certificate chains, which allows man-in-the-middle attackers to spoof an SSL server by using a non-CA certificate to sign a certificate for an arbitrary domain.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0229">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0229</vuln:cve-id>
    <vuln:published-datetime>2011-10-14T06:55:07.807-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-01-13T22:51:28.133-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50085" xml:lang="en">50085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50091" xml:lang="en">50091</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple Type Services (ATS) in Apple Mac OS X through 10.6.8 does not properly handle embedded Type 1 fonts, which allows remote attackers to execute arbitrary code via a crafted document that triggers an out-of-bounds memory access.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0230">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0230</vuln:cve-id>
    <vuln:published-datetime>2011-10-14T06:55:08.057-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-01-13T22:51:28.273-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50085" xml:lang="en">50085</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the ATSFontDeactivate API in Apple Type Services (ATS) in Apple Mac OS X before 10.7.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0231">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.0.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.1.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.2.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.3.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.9</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.10</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.6.8</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0231</vuln:cve-id>
    <vuln:published-datetime>2011-10-14T06:55:08.150-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-01-13T22:51:28.430-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50085" xml:lang="en">50085</vuln:reference>
    </vuln:references>
    <vuln:summary>CFNetwork in Apple Mac OS X before 10.7.2 does not properly follow an intended cookie-storage policy, which makes it easier for remote web servers to track users via a cookie, related to a "synchronization issue."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0232">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0232</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.097-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:31.833-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0233">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0233</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.147-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:31.977-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0234">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0234</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.193-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:32.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0235">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0235</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.223-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:32.273-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0237">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0237</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.253-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-13T22:50:02.747-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0238">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0238</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.287-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:32.523-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0240">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0240</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.333-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-13T22:50:03.073-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0241">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:imageio"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:imageio</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0241</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.363-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-05-11T23:34:30.697-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html" xml:lang="en">APPLE-SA-2011-10-12-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html" xml:lang="en">APPLE-SA-2012-02-01-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" xml:lang="en">APPLE-SA-2012-05-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5001" xml:lang="en">http://support.apple.com/kb/HT5001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5130" xml:lang="en">http://support.apple.com/kb/HT5130</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5281" xml:lang="en">http://support.apple.com/kb/HT5281</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in ImageIO in Apple Safari before 5.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with CCITT Group 4 encoding.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0242">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0242</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.397-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:32.927-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0.6 allows remote attackers to inject arbitrary web script or HTML via vectors involving a URL that contains a username.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0244">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0244</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.427-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-22T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-07-22T11:38:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit in Apple Safari before 5.0.6 allows user-assisted remote attackers to read arbitrary files via vectors related to improper canonicalization of URLs within RSS feeds.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0245">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.66.71.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.67.75.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.66.71.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.67.75.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0245</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:31.950-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.927-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15755" name="oval:org.mitre.oval:def:15755"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted pict file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0246">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0246</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:31.983-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:58.990-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15681" name="oval:org.mitre.oval:def:15681"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted GIF file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0247">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0247</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:32.013-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.067-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16186" name="oval:org.mitre.oval:def:16186"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple stack-based buffer overflows in Apple QuickTime before 7.7 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted H.264 movie.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0248">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0248</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:32.060-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-08-05T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-08-04T08:35:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the QuickTime ActiveX control in Apple QuickTime before 7.7 on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTL file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0249">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0249</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:32.093-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.160-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16089" name="oval:org.mitre.oval:def:16089"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted STSC atoms in a QuickTime movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0250">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0250</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:32.123-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.240-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15885" name="oval:org.mitre.oval:def:15885"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted STSS atoms in a QuickTime movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0251">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0251</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:32.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.300-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16143" name="oval:org.mitre.oval:def:16143"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted STSZ atoms in a QuickTime movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0252">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.66.71.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.67.75.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.66.71.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.67.75.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0252</vuln:cve-id>
    <vuln:published-datetime>2011-08-03T22:45:32.200-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.347-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15884" name="oval:org.mitre.oval:def:15884"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Aug/msg00000.html" xml:lang="en">APPLE-SA-2011-08-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted STTS atoms in a QuickTime movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0253">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0253</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.457-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-13T22:50:04.417-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0254">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0254</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.503-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:34.287-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0255">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:5.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:webkit"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.8"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.6.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0b</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:5.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:webkit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0255</vuln:cve-id>
    <vuln:published-datetime>2011-07-21T19:55:02.537-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-20T22:51:34.427-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2011//Jul/msg00002.html" xml:lang="en">APPLE-SA-2011-07-20-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4808" xml:lang="en">http://support.apple.com/kb/HT4808</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:summary>WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0256">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.66.71.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.67.75.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.66.71.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.67.75.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0256</vuln:cve-id>
    <vuln:published-datetime>2011-08-15T17:55:01.113-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.410-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16097" name="oval:org.mitre.oval:def:16097"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4826" xml:lang="en">http://support.apple.com/kb/HT4826</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted track run atoms in a QuickTime movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0257">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.66.71.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.67.75.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.66.71.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.67.75.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0257</vuln:cve-id>
    <vuln:published-datetime>2011-08-15T17:55:01.270-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.490-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16059" name="oval:org.mitre.oval:def:16059"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8365" xml:lang="en">8365</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4826" xml:lang="en">http://support.apple.com/kb/HT4826</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/17777" xml:lang="en">17777</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://zerodayinitiative.com/advisories/ZDI-11-252/" xml:lang="en">http://zerodayinitiative.com/advisories/ZDI-11-252/</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer signedness error in Apple QuickTime before 7.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PnSize opcode in a PICT file that triggers a stack-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0258">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.9"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.7</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.8</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0258</vuln:cve-id>
    <vuln:published-datetime>2011-09-06T11:55:01.540-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:28.997-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15671" name="oval:org.mitre.oval:def:15671"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8368" xml:lang="en">8368</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4826" xml:lang="en">http://support.apple.com/kb/HT4826</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/519483/100/0/threaded" xml:lang="en">20110831 ZDI-11-277: Apple QuickTime 3g2 'mp4v' atom size Remote Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://zerodayinitiative.com/advisories/ZDI-11-277/" xml:lang="en">http://zerodayinitiative.com/advisories/ZDI-11-277/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/69518" xml:lang="en">quicktime-mp4v-bo(69518)</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted image description associated with an mp4v tag in a movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0259">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:9.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:10.4.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:9.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:10.4.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0259</vuln:cve-id>
    <vuln:published-datetime>2011-10-12T14:55:01.177-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.613-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16919" name="oval:org.mitre.oval:def:16919"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html" xml:lang="en">APPLE-SA-2011-10-11-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" xml:lang="en">APPLE-SA-2011-10-12-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4981" xml:lang="en">http://support.apple.com/kb/HT4981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4999" xml:lang="en">http://support.apple.com/kb/HT4999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50067" xml:lang="en">50067</vuln:reference>
    </vuln:references>
    <vuln:summary>CoreFoundation, as used in Apple iTunes before 10.5, does not properly perform string tokenization, which allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0260">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.7.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.7.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.7.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.7.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0260</vuln:cve-id>
    <vuln:published-datetime>2011-10-14T06:55:08.230-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-01-13T22:51:31.040-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50085" xml:lang="en">50085</vuln:reference>
    </vuln:references>
    <vuln:summary>The CoreProcesses component in Apple Mac OS X 10.7 before 10.7.2 does not prevent a system window from receiving keystrokes in the locked-screen state, which might allow physically proximate attackers to bypass intended access restrictions by typing into this window.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0261">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0261</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.133-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.087-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">HPSBMA02621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-003/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-003/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64655" xml:lang="en">hp-opennnm-jovgraph-bo(64655)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in jovgraph.exe in jovgraph in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a malformed displayWidth option in the arg parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0262">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0262</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.180-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.167-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">SSRT100352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-004/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-004/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64654" xml:lang="en">hp-opennnm-ovutildll-bo(64654)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the stringToSeconds function in ovutil.dll in ovwebsnmpsrv.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via large values of variables to jovgraph.exe.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0263">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0263</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.227-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.213-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">HPSBMA02621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-005/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-005/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64653" xml:lang="en">hp-opennnm-ovas-bo(64653)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple stack-based buffer overflows in ovas.exe in the OVAS service in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allow remote attackers to execute arbitrary code via a long (1) Source Node or (2) Destination Node variable.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0264">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0264</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.307-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.277-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">HPSBMA02621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-006/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-006/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64652" xml:lang="en">hp-opennnm-ovutil-bo(64652)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in ovutil.dll in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long COOKIE variable.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0265">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0265</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.383-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.323-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">SSRT100352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-007/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-007/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64651" xml:lang="en">hp-opennnm-dataselect1-bo(64651)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long data_select1 parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0266">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0266</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.447-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.367-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8151" xml:lang="en">8151</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">SSRT100352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-008/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-008/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64650" xml:lang="en">hp-opennnm-nameparams-bo(64650)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long nameParams parameter, a different vulnerability than CVE-2011-0267.2.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0267">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0267</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.493-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.430-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8156" xml:lang="en">8156</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/17038" xml:lang="en">17038</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">SSRT100352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-009/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-009/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64649" xml:lang="en">hp-opennnm-schdparams-bo(64649)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allow remote attackers to execute arbitrary code via a long (1) schdParams or (2) nameParams parameter, a different vulnerability than CVE-2011-0266.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0268">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0268</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.540-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.493-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">HPSBMA02621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-010/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-010/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64648" xml:lang="en">hp-opennnm-text1-bo(64648)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long text1 parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0269">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0269</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.587-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.540-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">HPSBMA02621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-011/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-011/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64647" xml:lang="en">hp-opennnm-schdselect1-bo(64647)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long schd_select1 parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0270">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0270</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.620-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.587-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-134"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">HPSBMA02621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-012/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-012/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64646" xml:lang="en">hp-opennnm-nnmrptconfig-format-string(64646)</vuln:reference>
    </vuln:references>
    <vuln:summary>Format string vulnerability in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via format string specifiers in input data that involves an invalid template name.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0271">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0271</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.713-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.650-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=887" xml:lang="en">20110110 HP Network Node Manager Command Injection Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515628" xml:lang="en">SSRT100352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45762" xml:lang="en">45762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024951" xml:lang="en">1024951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0085" xml:lang="en">ADV-2011-0085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64657" xml:lang="en">hp-opennnm-cgi-command-exec(64657)</vuln:reference>
    </vuln:references>
    <vuln:summary>The CGI scripts in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 do not properly validate an unspecified parameter, which allows remote attackers to execute arbitrary commands by using a command string for this parameter's value, related to a "command injection vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0272">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:loadrunner:9.52"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:loadrunner:9.52</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0272</vuln:cve-id>
    <vuln:published-datetime>2011-01-18T13:03:08.317-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.697-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024956" xml:lang="en">1024956</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515682" xml:lang="en">SSRT100195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45792" xml:lang="en">45792</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0095" xml:lang="en">ADV-2011-0095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64659" xml:lang="en">loadrunner-unspec-code-execution(64659)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP LoadRunner 9.52 allows remote attackers to execute arbitrary code via network traffic to TCP port 5001 or 5002, related to the HttpTunnel feature.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0273">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_storage_data_protector_cell_manager:6.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_storage_data_protector_cell_manager:6.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0273</vuln:cve-id>
    <vuln:published-datetime>2011-01-24T20:00:02.487-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.760-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024983" xml:lang="en">1024983</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02688353" xml:lang="en">HPSBMA02625</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0177" xml:lang="en">ADV-2011-0177</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-024/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-024/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64818" xml:lang="en">hp-openview-storage-code-execution(64818)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in crs.exe in HP OpenView Storage Data Protector Cell Manager 6.11 allows remote attackers to execute arbitrary code via unspecified message types.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0274">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:business_availability_center:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:business_availability_center:7.55"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:business_availability_center:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:business_availability_center:8.05"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:business_service_management:9.01"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:business_availability_center:7.0</vuln:product>
      <vuln:product>cpe:/a:hp:business_availability_center:7.55</vuln:product>
      <vuln:product>cpe:/a:hp:business_availability_center:8.0</vuln:product>
      <vuln:product>cpe:/a:hp:business_availability_center:8.05</vuln:product>
      <vuln:product>cpe:/a:hp:business_service_management:9.01</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0274</vuln:cve-id>
    <vuln:published-datetime>2011-01-24T13:00:03.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.807-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=129562482815203&amp;w=2" xml:lang="en">SSRT100342</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024986" xml:lang="en">1024986</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45944" xml:lang="en">45944</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0188" xml:lang="en">ADV-2011-0188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64846" xml:lang="en">hp-bac-bsm-xss(64846)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in HP Business Availability Center (BAC) 7.x through 7.55 and 8.x through 8.05, and Business Service Management (BSM) through 9.01, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0275">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_storage_data_protector:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_storage_data_protector:6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_storage_data_protector:6.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_storage_data_protector:6.0</vuln:product>
      <vuln:product>cpe:/a:hp:openview_storage_data_protector:6.10</vuln:product>
      <vuln:product>cpe:/a:hp:openview_storage_data_protector:6.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0275</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T16:00:29.750-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.867-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02699143" xml:lang="en">SSRT100301</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024991" xml:lang="en">1024991</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46018" xml:lang="en">46018</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0218" xml:lang="en">ADV-2011-0218</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64932" xml:lang="en">hp-openview-storage-dos(64932)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP OpenView Storage Data Protector 6.0, 6.10, and 6.11 allows remote attackers to cause a denial of service via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0276">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_performance_insight:5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_performance_insight:5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_performance_insight:5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_performance_insight:5.31"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_performance_insight:5.41"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_performance_insight:5.2</vuln:product>
      <vuln:product>cpe:/a:hp:openview_performance_insight:5.3</vuln:product>
      <vuln:product>cpe:/a:hp:openview_performance_insight:5.4</vuln:product>
      <vuln:product>cpe:/a:hp:openview_performance_insight:5.31</vuln:product>
      <vuln:product>cpe:/a:hp:openview_performance_insight:5.41</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0276</vuln:cve-id>
    <vuln:published-datetime>2011-02-01T20:00:06.533-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:29.777-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02695453" xml:lang="en">SSRT090246</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8136" xml:lang="en">8136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/16984" xml:lang="en">16984</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516093/100/0/threaded" xml:lang="en">20110131 ZDI-11-034: HP OpenView Performance Insight Server Backdoor Account Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46079" xml:lang="en">46079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025014" xml:lang="en">1025014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0258" xml:lang="en">ADV-2011-0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-034" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-034</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65038" xml:lang="en">openview-dopost-code-execution(65038)</vuln:reference>
    </vuln:references>
    <vuln:summary>HP OpenView Performance Insight Server 5.2, 5.3, 5.31, 5.4, and 5.41 contains a "hidden account" in the com.trinagy.security.XMLUserManager Java class, which allows remote attackers to execute arbitrary code via the doPost method in the com.trinagy.servlet.HelpManagerServlet class.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0277">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.3.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:power_manager:4.2.5</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.6</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.7</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.8</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.9</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.3.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0277</vuln:cve-id>
    <vuln:published-datetime>2011-02-08T20:00:09.307-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2013-08-03T03:29:48.903-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02711131" xml:lang="en">SSRT100381</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46258" xml:lang="en">46258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025032" xml:lang="en">1025032</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in HP Power Manager (HPPM) 4.3.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative accounts.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0278">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:web_jetadmin:10.2:sr3"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:web_jetadmin:10.2:sr4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:web_jetadmin:10.2:sr3</vuln:product>
      <vuln:product>cpe:/a:hp:web_jetadmin:10.2:sr4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0278</vuln:cve-id>
    <vuln:published-datetime>2011-03-01T18:00:02.613-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-17T22:56:42.273-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02714670" xml:lang="en">SSRT100391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025130" xml:lang="en">1025130</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46595" xml:lang="en">46595</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0516" xml:lang="en">ADV-2011-0516</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP Web Jetadmin 10.2 Service Release 3 and 4 allows local users to bypass intended access restrictions via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0279">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:multifunction_peripheral_digital_sending_software:4.91.00"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:multifunction_peripheral_digital_sending_software:4.91.00</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0279</vuln:cve-id>
    <vuln:published-datetime>2011-03-07T16:00:01.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:25.993-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02738104" xml:lang="en">HPSBPI02640</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46679" xml:lang="en">46679</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025155" xml:lang="en">1025155</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0561" xml:lang="en">ADV-2011-0561</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65866" xml:lang="en">hp-mfpdigitalsending-sec-bypass(65866)</vuln:reference>
    </vuln:references>
    <vuln:summary>HP Multifunction Peripheral (MFP) Digital Sending Software (DSS) 4.91.00 does not properly configure authentication settings of managed devices within device templates, which allows attackers to access these devices via actions that were intended to require authentication.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0280">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:power_manager:4.3.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:power_manager:4.2.5</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.6</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.7</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.8</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.2.9</vuln:product>
      <vuln:product>cpe:/a:hp:power_manager:4.3.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0280</vuln:cve-id>
    <vuln:published-datetime>2011-03-14T15:55:00.697-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.057-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2011-03/0111.html" xml:lang="en">SSRT100381</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46830" xml:lang="en">46830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66035" xml:lang="en">powermanager-unspecified-xss(66035)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in HP Power Manager (HPPM) 4.3.2 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the logType parameter to Contents/exportlogs.asp, (2) the Id parameter to Contents/pagehelp.asp, or the (3) SORTORD or (4) SORTCOL parameter to Contents/applicationlogs.asp.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0281">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0281</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T13:00:55.237-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:30.777-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" xml:lang="en">SUSE-SR:2011:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://mailman.mit.edu/pipermail/kerberos/2010-December/016800.html" xml:lang="en">[kerberos] 20101222 LDAP handle unavailable: Can't contact LDAP server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8073" xml:lang="en">8073</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:024" xml:lang="en">MDVSA-2011:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:025" xml:lang="en">MDVSA-2011:025</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0199.html" xml:lang="en">RHSA-2011:0199</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0200.html" xml:lang="en">RHSA-2011:0200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516299/100/0/threaded" xml:lang="en">20110208 MITKRB5-SA-2011-002 KDC denial of service attacks [CVE-2011-0281 CVE-2011-0282 CVE-2011-0283]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/520102/100/0/threaded" xml:lang="en">20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46265" xml:lang="en">46265</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025037" xml:lang="en">1025037</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2011-0012.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2011-0012.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0330" xml:lang="en">ADV-2011-0330</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0333" xml:lang="en">ADV-2011-0333</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0347" xml:lang="en">ADV-2011-0347</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0464" xml:lang="en">ADV-2011-0464</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65324" xml:lang="en">kerberos-ldap-descriptor-dos(65324)</vuln:reference>
    </vuln:references>
    <vuln:summary>The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0282">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0282</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T13:00:55.287-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:33.170-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" xml:lang="en">SUSE-SR:2011:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8073" xml:lang="en">8073</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:024" xml:lang="en">MDVSA-2011:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:025" xml:lang="en">MDVSA-2011:025</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0199.html" xml:lang="en">RHSA-2011:0199</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0200.html" xml:lang="en">RHSA-2011:0200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516299/100/0/threaded" xml:lang="en">20110208 MITKRB5-SA-2011-002 KDC denial of service attacks [CVE-2011-0281 CVE-2011-0282 CVE-2011-0283]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/520102/100/0/threaded" xml:lang="en">20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46271" xml:lang="en">46271</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025037" xml:lang="en">1025037</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2011-0012.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2011-0012.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0330" xml:lang="en">ADV-2011-0330</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0333" xml:lang="en">ADV-2011-0333</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0347" xml:lang="en">ADV-2011-0347</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0464" xml:lang="en">ADV-2011-0464</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65323" xml:lang="en">kerberos-ldap-dos(65323)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0283">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5-1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0283</vuln:cve-id>
    <vuln:published-datetime>2011-02-10T13:00:55.317-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:35.387-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8073" xml:lang="en">8073</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-002.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516299/100/0/threaded" xml:lang="en">20110208 MITKRB5-SA-2011-002 KDC denial of service attacks [CVE-2011-0281 CVE-2011-0282 CVE-2011-0283]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46272" xml:lang="en">46272</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025037" xml:lang="en">1025037</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0330" xml:lang="en">ADV-2011-0330</vuln:reference>
    </vuln:references>
    <vuln:summary>The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request packet that does not trigger a response packet.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0284">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0284</vuln:cve-id>
    <vuln:published-datetime>2011-03-19T22:00:03.253-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:35.983-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056413.html" xml:lang="en">FEDORA-2011-3547</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056573.html" xml:lang="en">FEDORA-2011-3464</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056579.html" xml:lang="en">FEDORA-2011-3462</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025216" xml:lang="en">1025216</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/943220" xml:lang="en">VU#943220</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:048" xml:lang="en">MDVSA-2011:048</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0356.html" xml:lang="en">RHSA-2011:0356</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/517029/100/0/threaded" xml:lang="en">20110315 MITKRB5-SA-2011-003 [CVE-2011-0284] KDC double-free when PKINIT enabled</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46881" xml:lang="en">46881</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1088-1" xml:lang="en">USN-1088-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0672" xml:lang="en">ADV-2011-0672</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0673" xml:lang="en">ADV-2011-0673</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0680" xml:lang="en">ADV-2011-0680</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0722" xml:lang="en">ADV-2011-0722</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0763" xml:lang="en">ADV-2011-0763</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66101" xml:lang="en">kerberos-perpareerroras-code-execution(66101)</vuln:reference>
    </vuln:references>
    <vuln:summary>Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0285">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.7.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.8.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0285</vuln:cve-id>
    <vuln:published-datetime>2011-04-14T20:55:00.990-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:38.373-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621726</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899" xml:lang="en">http://krbdev.mit.edu/rt/Ticket/Display.html?id=6899</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058181.html" xml:lang="en">FEDORA-2011-5333</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8200" xml:lang="en">8200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-004.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:077" xml:lang="en">MDVSA-2011:077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0447.html" xml:lang="en">RHSA-2011:0447</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/517484/100/0/threaded" xml:lang="en">20110413 MITKRB5-SA-2011-004 kadmind invalid pointer free() [CVE-2011-0285]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47310" xml:lang="en">47310</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025320" xml:lang="en">1025320</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0936" xml:lang="en">ADV-2011-0936</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0986" xml:lang="en">ADV-2011-0986</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0997" xml:lang="en">ADV-2011-0997</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="https://hermes.opensuse.org/messages/8086843" xml:lang="en">openSUSE-SU-2011:0348</vuln:reference>
    </vuln:references>
    <vuln:summary>The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0286">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server_express:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server_express:5.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.0</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.1</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.2</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.3</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server_express:5.0.1</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server_express:5.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0286</vuln:cve-id>
    <vuln:published-datetime>2011-04-18T14:55:00.877-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-18T14:55:00.877-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-04-18T15:17:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025356" xml:lang="en">1025356</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/KB26296" xml:lang="en">http://www.blackberry.com/btsc/KB26296</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.cybsec.com/vuln/CYBSEC_Advisory_2011_0401_Cross_Site_Scripting_XSS_in_Blackberry_WebDesktop.pdf" xml:lang="en">http://www.cybsec.com/vuln/CYBSEC_Advisory_2011_0401_Cross_Site_Scripting_XSS_in_Blackberry_WebDesktop.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47324" xml:lang="en">47324</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0971" xml:lang="en">ADV-2011-0971</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in webdesktop/app in the BlackBerry Web Desktop Manager component in Research In Motion (RIM) BlackBerry Enterprise Server (BES) software before 5.0.2 MR5 and 5.0.3 before MR1, and BlackBerry Enterprise Server Express software 5.0.1 and 5.0.2, allows remote attackers to inject arbitrary web script or HTML via the displayErrorMessage parameter in a ManageDevices action.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0287">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server_express:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server_express:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server_express:5.0.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.1</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.2</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.3</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server_express:5.0.1</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server_express:5.0.2</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server_express:5.0.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0287</vuln:cve-id>
    <vuln:published-datetime>2011-07-14T19:55:02.053-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-07-19T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-07-15T09:28:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/KB27258" xml:lang="en">http://www.blackberry.com/btsc/KB27258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/48655" xml:lang="en">48655</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the BlackBerry Administration API in Research In Motion (RIM) BlackBerry Enterprise Server (BES) software 5.0.1 through 5.0.3, and BlackBerry Enterprise Server Express software 5.0.1 through 5.0.3, allows remote attackers to read text files or cause a denial of service via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0290">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:5.0.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:lotus:domino"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:exchange_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:5.0.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0290</vuln:cve-id>
    <vuln:published-datetime>2011-10-21T06:55:03.757-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.337-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1026179" xml:lang="en">1026179</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/KB28524" xml:lang="en">http://www.blackberry.com/btsc/KB28524</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50064" xml:lang="en">50064</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/70519" xml:lang="en">bes-collaboration-service-spoofing(70519)</vuln:reference>
    </vuln:references>
    <vuln:summary>The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0291">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:blackberry:blackberry_tablet_os:1.0.8.4985"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:blackberry:blackberry_tablet_os:1.0.8.4985</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0291</vuln:cve-id>
    <vuln:published-datetime>2011-12-08T15:55:00.780-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.383-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blackberry.com/btsc/KB29191" xml:lang="en">http://blackberry.com/btsc/KB29191</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1026386" xml:lang="en">1026386</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50931" xml:lang="en">50931</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/71659" xml:lang="en">blackberry-playbook-priv-esc(71659)</vuln:reference>
    </vuln:references>
    <vuln:summary>The BlackBerry PlayBook service on the Research In Motion (RIM) BlackBerry PlayBook tablet with software before 1.0.8.6067 allows local users to gain privileges via a crafted configuration file in a backup archive.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0310">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0310</vuln:cve-id>
    <vuln:published-datetime>2011-01-13T14:00:05.930-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.447-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45923" xml:lang="en">45923</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0128" xml:lang="en">ADV-2011-0128</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27014224" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27014224</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64628" xml:lang="en">wmq-messageheader-bo(64628)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="https://www-304.ibm.com/support/docview.wss?uid=swg1SE45551" xml:lang="en">IZ77607</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in IBM WebSphere MQ 7.0 before 7.0.1.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted header field in a message.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0311">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:java:1.4.2.13.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.11.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.11.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.12.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.12.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.12.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:5.0.12.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:runtimes_for_java_technology:6.0.9.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:java:1.4.2</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.1</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.2</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.3</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.4</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.5</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.6</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.7</vuln:product>
      <vuln:product>cpe:/a:ibm:java:1.4.2.13.8</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.11.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.11.1</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.11.2</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.12.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.12.1</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.12.2</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.12.3</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:5.0.12.4</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.2.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.3.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.4.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.5.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.6.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.8.0</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.8.1</vuln:product>
      <vuln:product>cpe:/a:ibm:runtimes_for_java_technology:6.0.9.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0311</vuln:cve-id>
    <vuln:published-datetime>2011-09-02T19:55:01.943-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.510-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" xml:lang="en">SUSE-SA:2011:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" xml:lang="en">SUSE-SU-2011:0823</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-1159.html" xml:lang="en">RHSA-2011:1159</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-1265.html" xml:lang="en">RHSA-2011:1265</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ89602" xml:lang="en">IZ89602</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ89620" xml:lang="en">IZ89620</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65189" xml:lang="en">ibm-rjt-classfile-dos(65189)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="https://www-304.ibm.com/support/docview.wss?uid=isg1PM42551" xml:lang="en">PM42551</vuln:reference>
    </vuln:references>
    <vuln:summary>The class file parser in IBM Java before 1.4.2 SR13 FP9, as used in IBM Runtimes for Java Technology 5.0.0 before SR13 and 6.0.0 before SR10, allows remote authenticated users to cause a denial of service (JVM segmentation fault, and possibly memory consumption or an infinite loop) via a crafted attribute length field in a class file, which triggers a buffer over-read.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0314">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.1.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0314</vuln:cve-id>
    <vuln:published-datetime>2011-01-11T20:00:02.040-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.557-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45801" xml:lang="en">45801</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ81294" xml:lang="en">IZ81294</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64550" xml:lang="en">wmq-message-bo(64550)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in IBM WebSphere MQ 6.0 before 6.0.2.11 and 7.0 before 7.0.1.5 allows remote authenticated users to execute arbitrary code or cause a denial of service (queue manager crash) by inserting an invalid message into the queue.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0315">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.27"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.31"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.33"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.25</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.27</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.29</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.31</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.33</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0315</vuln:cve-id>
    <vuln:published-datetime>2011-01-11T20:00:02.103-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.617-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46736" xml:lang="en">46736</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0564" xml:lang="en">ADV-2011-0564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PM18512" xml:lang="en">PM18512</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007951" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27014463" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27014463</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64554" xml:lang="en">was-webcontainer-xss(64554)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the Servlet Engine / Web Container component in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.35 and 7.0 before 7.0.0.15 allows remote attackers to inject arbitrary web script or HTML via vectors related to the lack of an error page for an application.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0316">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.27"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.31"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.33"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.25</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.27</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.29</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.31</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.33</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0316</vuln:cve-id>
    <vuln:published-datetime>2011-01-11T20:00:02.290-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.680-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46736" xml:lang="en">46736</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0564" xml:lang="en">ADV-2011-0564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PM24372" xml:lang="en">PM24372</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007951" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27014463" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27014463</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64558" xml:lang="en">was-consoleservlet-info-disclosure(64558)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Administrative Console component in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.35 and 7.0 before 7.0.0.15 does not properly restrict access to console servlets, which allows remote attackers to obtain potentially sensitive status information via a direct request.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0317">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196a"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.204"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.205"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.100"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.103"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.105"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.106"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.321"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.323"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.324"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.325"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.383"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.432"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.0.210"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.1.004"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.1.016"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.4.020"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.021"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.022"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.023"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.0.456"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.3.471"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.595"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.596"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.1.601"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.2.602"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.6.606"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.7.609"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.8.612"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.615"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.620"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:shockwave_player:1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:2.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:3.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:4.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:5.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:6.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196a</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.204</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.205</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.100</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.103</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.105</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.106</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.321</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.323</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.324</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.325</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.383</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.432</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.0.210</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.1.004</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.0.11</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.1.016</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.4.020</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.021</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.022</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.023</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.0.456</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.3.471</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.595</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.596</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.1.601</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.2.602</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.6.606</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.7.609</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.8.612</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.615</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.620</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0317</vuln:cve-id>
    <vuln:published-datetime>2011-06-16T19:55:01.230-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-04T22:51:37.160-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb11-17.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb11-17.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-166A.html" xml:lang="en">TA11-166A</vuln:reference>
    </vuln:references>
    <vuln:summary>Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0318">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196a"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.204"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.205"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.100"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.103"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.105"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.106"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.321"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.323"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.324"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.325"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.383"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.432"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.0.210"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.1.004"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.1.016"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.4.020"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.021"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.022"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.023"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.0.456"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.3.471"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.595"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.596"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.1.601"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.2.602"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.6.606"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.7.609"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.8.612"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.615"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.620"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:shockwave_player:1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:2.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:3.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:4.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:5.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:6.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196a</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.204</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.205</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.100</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.103</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.105</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.106</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.321</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.323</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.324</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.325</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.383</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.432</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.0.210</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.1.004</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.0.11</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.1.016</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.4.020</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.021</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.022</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.023</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.0.456</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.3.471</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.595</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.596</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.1.601</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.2.602</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.6.606</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.7.609</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.8.612</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.615</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.620</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0318</vuln:cve-id>
    <vuln:published-datetime>2011-06-16T19:55:01.277-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-04T22:51:37.317-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb11-17.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb11-17.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-166A.html" xml:lang="en">TA11-166A</vuln:reference>
    </vuln:references>
    <vuln:summary>Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0319">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196a"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.204"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.205"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.100"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.103"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.105"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.106"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.321"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.323"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.324"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.325"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.383"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.432"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.0.210"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.1.004"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.1.016"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.4.020"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.021"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.022"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.023"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.0.456"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.3.471"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.595"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.596"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.1.601"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.2.602"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.6.606"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.7.609"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.8.612"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.615"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.620"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:shockwave_player:1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:2.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:3.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:4.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:5.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:6.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196a</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.204</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.205</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.100</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.103</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.105</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.106</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.321</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.323</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.324</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.325</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.383</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.432</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.0.210</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.1.004</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.0.11</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.1.016</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.4.020</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.021</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.022</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.023</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.0.456</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.3.471</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.595</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.596</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.1.601</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.2.602</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.6.606</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.7.609</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.8.612</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.615</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.620</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0319</vuln:cve-id>
    <vuln:published-datetime>2011-06-16T19:55:01.323-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-04T22:51:37.457-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb11-17.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb11-17.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-166A.html" xml:lang="en">TA11-166A</vuln:reference>
    </vuln:references>
    <vuln:summary>Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0320, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0320">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196a"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.204"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.205"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.100"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.103"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.105"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.106"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.321"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.323"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.324"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.325"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.383"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.432"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.0.210"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.1.004"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.1.016"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.4.020"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.021"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.022"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.023"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.0.456"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.3.471"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.595"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.596"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.1.601"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.2.602"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.6.606"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.7.609"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.8.612"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.615"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.620"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:shockwave_player:1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:2.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:3.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:4.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:5.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:6.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196a</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.204</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.205</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.100</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.103</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.105</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.106</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.321</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.323</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.324</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.325</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.383</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.432</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.0.210</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.1.004</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.0.11</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.1.016</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.4.020</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.021</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.022</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.023</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.0.456</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.3.471</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.595</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.596</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.1.601</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.2.602</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.6.606</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.7.609</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.8.612</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.615</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.620</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0320</vuln:cve-id>
    <vuln:published-datetime>2011-06-16T19:55:01.370-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-04T22:51:37.613-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb11-17.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb11-17.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-166A.html" xml:lang="en">TA11-166A</vuln:reference>
    </vuln:references>
    <vuln:summary>Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0335, CVE-2011-2119, and CVE-2011-2122.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0321">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.4:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.4:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.4:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.4:sp4"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.4:sp5"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.5.3.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:networker:7.6.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:emc:networker:6.0</vuln:product>
      <vuln:product>cpe:/a:emc:networker:6.1</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.0</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.2</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.3</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.4</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.4:sp1</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.4:sp2</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.4:sp3</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.4:sp4</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.4:sp5</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5:sp1</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5:sp2</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5:sp3</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5.3.1</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5.3.2</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5.3.3</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.5.3.4</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.2</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.3</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.4</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.5</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.6</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.7</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.8</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.0.9</vuln:product>
      <vuln:product>cpe:/a:emc:networker:7.6.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0321</vuln:cve-id>
    <vuln:published-datetime>2011-02-01T13:00:03.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.743-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2011-01/0162.html" xml:lang="en">20110126 ESA-2011-003: EMC NetWorker librpc.dll spoofing vulnerability.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2011-01/att-0162/ESA-2011-003.txt" xml:lang="en">http://archives.neohapsis.com/archives/bugtraq/2011-01/att-0162/ESA-2011-003.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025010" xml:lang="en">1025010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46044" xml:lang="en">46044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0241" xml:lang="en">ADV-2011-0241</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64997" xml:lang="en">networker-librpc-security-bypass(64997)</vuln:reference>
    </vuln:references>
    <vuln:summary>librpc.dll in nsrexecd in EMC NetWorker before 7.5 SP4, 7.5.3.x before 7.5.3.5, and 7.6.x before 7.6.1.2 does not properly mitigate the possibility of a spoofed localhost source IP address, which allows remote attackers to (1) register or (2) unregister RPC services, and consequently cause a denial of service or obtain sensitive information from interprocess communication, via crafted UDP packets containing service commands.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0322">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rsa:access_manager_server:5.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rsa:access_manager_server:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:rsa:access_manager_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rsa:access_manager_server:6.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rsa:access_manager_server:6.1.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rsa:access_manager_server:5.5.3</vuln:product>
      <vuln:product>cpe:/a:rsa:access_manager_server:6.0.4</vuln:product>
      <vuln:product>cpe:/a:rsa:access_manager_server:6.1</vuln:product>
      <vuln:product>cpe:/a:rsa:access_manager_server:6.1.2</vuln:product>
      <vuln:product>cpe:/a:rsa:access_manager_server:6.1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0322</vuln:cve-id>
    <vuln:published-datetime>2011-03-16T18:55:01.357-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:40.107-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8142" xml:lang="en">8142</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/517023/100/0/threaded" xml:lang="en">20110315 ESA-2011-009: RSA, The Security Division of EMC, announces a fix for potential security vulnerability in RSA Access Manager Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46875" xml:lang="en">46875</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025214" xml:lang="en">1025214</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0676" xml:lang="en">ADV-2011-0676</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66104" xml:lang="en">rsa-unspecified-security-bypass(66104)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in EMC RSA Access Manager Server 5.5.x, 6.0.x, and 6.1.x allows remote attackers to access resources via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0323">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:topazsystems:sigplus_pro_activex_control:3.95"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:topazsystems:sigplus_pro_activex_control:3.95</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0323</vuln:cve-id>
    <vuln:published-datetime>2011-02-07T16:00:14.680-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.837-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46128" xml:lang="en">46128</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65117" xml:lang="en">sigplus-sigmessage-file-overwrite(65117)</vuln:reference>
    </vuln:references>
    <vuln:summary>Topaz Systems SigPlus Pro ActiveX Control 3.95, and possibly other versions before 4.29, allows remote attackers to execute arbitrary code by calling the exposed unsafe (1) SetLogFilePath and (2) SigMessage methods to create arbitrary files with arbitrary content.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0324">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:topazsystems:sigplus_pro_activex_control:3.95"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:topazsystems:sigplus_pro_activex_control:3.95</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0324</vuln:cve-id>
    <vuln:published-datetime>2011-02-07T16:00:14.777-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.900-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46128" xml:lang="en">46128</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65114" xml:lang="en">sigplus-keystring-bo(65114)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65115" xml:lang="en">sigplus-newpath-bo(65115)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65116" xml:lang="en">sigplus-newportpath-bo(65116)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple heap-based buffer overflows in Topaz Systems SigPlus Pro ActiveX Control 3.95, and possibly other versions before 4.29, allow remote attackers to execute arbitrary code via a long (1) KeyString property, (2) NewPath parameter to the SetLocalIniFilePath method, or (3) NewPortPath parameter to the SetTabletPortPath method.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0329">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dell:dellsystemlite.scanner_activex_control:1.0.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dell:dellsystemlite.scanner_activex_control:1.0.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0329</vuln:cve-id>
    <vuln:published-datetime>2011-02-21T13:00:01.160-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-17T22:56:44.507-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46443" xml:lang="en">46443</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025094" xml:lang="en">1025094</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in the GetData method in the Dell DellSystemLite.Scanner ActiveX control in DellSystemLite.ocx 1.0.0.0 allows remote attackers to read arbitrary files via directory traversal sequences in the fileID parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0330">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dell:dellsystemlite.scanner_activex_control:1.0.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dell:dellsystemlite.scanner_activex_control:1.0.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0330</vuln:cve-id>
    <vuln:published-datetime>2011-02-21T13:00:01.223-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-17T22:56:44.647-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46443" xml:lang="en">46443</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025094" xml:lang="en">1025094</vuln:reference>
    </vuln:references>
    <vuln:summary>The Dell DellSystemLite.Scanner ActiveX control in DellSystemLite.ocx 1.0.0.0 does not properly restrict the values of the WMIAttributesOfInterest property, which allows remote attackers to execute arbitrary WMI Query Language (WQL) statements via a crafted value, as demonstrated by a value that triggers disclosure of information about installed software.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0331">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:honeywell:scanserver_activex_control:780.0.20.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:honeywell:scanserver_activex_control:780.0.20.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0331</vuln:cve-id>
    <vuln:published-datetime>2011-03-22T13:55:01.253-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-08T23:32:50.463-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46930" xml:lang="en">46930</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0725" xml:lang="en">ADV-2011-0725</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the addOSPLext method in the Honeywell ScanServer ActiveX control 780.0.20.5 allows remote attackers to execute arbitrary code via a crafted HTML document.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0332">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:4.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_phantom:2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:1.0.2</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.0</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.1.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.2</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.2.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.2.3</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.2.4</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_phantom:2.3</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:2.0</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:2.2</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:2.3</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.0</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.1.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.1.3</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.1.4</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.2</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.2.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.3.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:4.0</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:4.1.1</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:4.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0332</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T14:00:00.947-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2016-11-08T12:47:55.837-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2016-11-08T10:54:04.343-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory" xml:lang="en">http://www.foxitsoftware.com/pdf/reader/security_bulletins.php#memory</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025129" xml:lang="en">1025129</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0508" xml:lang="en">ADV-2011-0508</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in Foxit Reader before 4.3.1.0218 and Foxit Phantom before 2.3.3.1112 allows remote attackers to execute arbitrary code via crafted ICC chunks in a PDF file, which triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0333">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0:hp1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0:hp2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:groupwise:8.0</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0:hp1</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0:hp2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0333</vuln:cve-id>
    <vuln:published-datetime>2011-10-07T22:52:52.113-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-05-14T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-10-10T07:49:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/viewContent.do?externalId=7009208" xml:lang="en">http://www.novell.com/support/viewContent.do?externalId=7009208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/show_bug.cgi?id=678715" xml:lang="en">https://bugzilla.novell.com/show_bug.cgi?id=678715</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="https://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php?id=943" xml:lang="en">20110926 Novell GroupWise iCal TZNAME Heap Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the NgwiCalVTimeZoneBody::ParseSelf function in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a crafted TZNAME variable in a VCALENDAR attachment in an e-mail message, related to an "integer truncation error."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0334">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0:hp1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0:hp2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:groupwise:8.0</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0:hp1</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0:hp2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0334</vuln:cve-id>
    <vuln:published-datetime>2011-10-07T22:52:52.143-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-05-14T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-10-10T07:55:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/viewContent.do?externalId=7009210" xml:lang="en">http://www.novell.com/support/viewContent.do?externalId=7009210</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/show_bug.cgi?id=678939" xml:lang="en">https://bugzilla.novell.com/show_bug.cgi?id=678939</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in gwia.exe in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a long HTTP request for a .css file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0335">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.196a"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.204"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.0.205"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.100"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.103"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.105"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.1.106"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.321"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.323"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.324"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:8.5.325"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.383"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:9.0.432"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.0.210"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.0.1.004"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.1.016"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.1.4.020"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.021"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.022"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:10.2.0.023"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.0.456"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.0.3.471"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.595"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.0.596"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.1.601"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.2.602"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.6.606"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.7.609"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.8.612"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.615"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:shockwave_player:11.5.9.620"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:shockwave_player:1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:2.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:3.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:4.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:5.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:6.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.196a</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.204</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.0.205</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.100</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.103</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.105</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.1.106</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.321</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.323</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.324</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:8.5.325</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.383</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:9.0.432</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.0.210</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.0.1.004</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.0.11</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.1.016</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.1.4.020</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.021</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.022</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:10.2.0.023</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.0.456</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.0.3.471</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.595</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.0.596</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.1.601</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.2.602</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.6.606</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.7.609</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.8.612</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.615</vuln:product>
      <vuln:product>cpe:/a:adobe:shockwave_player:11.5.9.620</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0335</vuln:cve-id>
    <vuln:published-datetime>2011-06-16T19:55:01.400-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-10-04T22:51:38.550-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb11-17.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb11-17.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-166A.html" xml:lang="en">TA11-166A</vuln:reference>
    </vuln:references>
    <vuln:summary>Dirapi.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-2119, and CVE-2011-2122.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0340">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:advantech:advantech_studio:6.1:sp6_61.6.01.05"/>
        <cpe-lang:fact-ref name="cpe:/a:indusoft:thin_client:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:indusoft:web_studio:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:indusoft:web_studio:6.1:sp6"/>
        <cpe-lang:fact-ref name="cpe:/a:indusoft:web_studio:7.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:advantech:advantech_studio:6.1:sp6_61.6.01.05</vuln:product>
      <vuln:product>cpe:/a:indusoft:thin_client:7.0</vuln:product>
      <vuln:product>cpe:/a:indusoft:web_studio:6.1</vuln:product>
      <vuln:product>cpe:/a:indusoft:web_studio:6.1:sp6</vuln:product>
      <vuln:product>cpe:/a:indusoft:web_studio:7.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0340</vuln:cve-id>
    <vuln:published-datetime>2011-05-04T18:55:01.467-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2013-05-20T23:04:44.983-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03" xml:lang="en">http://ics-cert.us-cert.gov/advisories/ICSA-12-249-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm" xml:lang="en">http://www.advantechdirect.com/eMarketingPrograms/AStudio_Patch/AStudio7.0_Patch_Final.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.indusoft.com/hotfixes/hotfixes.php" xml:lang="en">http://www.indusoft.com/hotfixes/hotfixes.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47596" xml:lang="en">47596</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf" xml:lang="en">http://www.us-cert.gov/control_systems/pdf/ICSA-12-137-02.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/1115" xml:lang="en">ADV-2011-1115</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/1116" xml:lang="en">ADV-2011-1116</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0341">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:artifex:mupdf:2008.09.02"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:artifex:mupdf:2008.09.02</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0341</vuln:cve-id>
    <vuln:published-datetime>2011-05-13T13:05:41.673-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:26.963-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47739" xml:lang="en">47739</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/1191" xml:lang="en">ADV-2011-1191</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/67298" xml:lang="en">mupdf-pdfmozonmouse-bo(67298)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the pdfmoz_onmouse function in apps/mozilla/moz_main.c in the MuPDF plug-in 2008.09.02 for Firefox allows remote attackers to execute arbitrary code via a crafted web site.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0342">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:indusoft:web_studio:7.0b2:hotfix7.0.01.04"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:indusoft:web_studio:7.0b2:hotfix7.0.01.04</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0342</vuln:cve-id>
    <vuln:published-datetime>2011-09-02T12:55:01.460-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2013-05-20T23:04:45.633-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02" xml:lang="en">http://ics-cert.us-cert.gov/advisories/ICSA-11-273-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.indusoft.com/hotfixes/hotfixes.php" xml:lang="en">http://www.indusoft.com/hotfixes/hotfixes.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/49403" xml:lang="en">49403</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in the InduSoft ISSymbol ActiveX control in ISSymbol.ocx 301.1104.601.0 in InduSoft Web Studio 7.0B2 hotfix 7.0.01.04 allow remote attackers to execute arbitrary code via a long parameter to the (1) Open, (2) Close, or (3) SetCurrentLanguage method.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0343">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:2.0::open_source"/>
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:2.0::premium"/>
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:3.0::open_source"/>
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:3.0::premium"/>
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:3.1::open_source"/>
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:3.1::premium"/>
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:3.2::open_source"/>
          <cpe-lang:fact-ref name="cpe:/a:balabit:syslog-ng:3.2::premium"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd"/>
          <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:balabit:syslog-ng:2.0::open_source</vuln:product>
      <vuln:product>cpe:/a:balabit:syslog-ng:2.0::premium</vuln:product>
      <vuln:product>cpe:/a:balabit:syslog-ng:3.0::open_source</vuln:product>
      <vuln:product>cpe:/a:balabit:syslog-ng:3.0::premium</vuln:product>
      <vuln:product>cpe:/a:balabit:syslog-ng:3.1::open_source</vuln:product>
      <vuln:product>cpe:/a:balabit:syslog-ng:3.1::premium</vuln:product>
      <vuln:product>cpe:/a:balabit:syslog-ng:3.2::open_source</vuln:product>
      <vuln:product>cpe:/a:balabit:syslog-ng:3.2::premium</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0343</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T11:00:03.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:40.733-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608491" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608491</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515955/100/0/threaded" xml:lang="en">20110125 syslog-ng wrong file permission vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45988" xml:lang="en">45988</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html" xml:lang="en">[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html" xml:lang="en">[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released</vuln:reference>
    </vuln:references>
    <vuln:summary>Balabit syslog-ng 2.0, 3.0, 3.1, 3.2 OSE and PE, when running on FreeBSD or HP-UX, does not properly perform cast operations, which causes syslog-ng to use a default value of -1 to create log files with insecure permissions (07777), which allows local users to read and write to these log files.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0344">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnipcx:5.0::enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnipcx:6.2::enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnipcx:7.0::enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnipcx:7.1::enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnipcx:8.0::enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnipcx:9.0::enterprise"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:alcatel-lucent:omnipcx:5.0::enterprise</vuln:product>
      <vuln:product>cpe:/a:alcatel-lucent:omnipcx:6.2::enterprise</vuln:product>
      <vuln:product>cpe:/a:alcatel-lucent:omnipcx:7.0::enterprise</vuln:product>
      <vuln:product>cpe:/a:alcatel-lucent:omnipcx:7.1::enterprise</vuln:product>
      <vuln:product>cpe:/a:alcatel-lucent:omnipcx:8.0::enterprise</vuln:product>
      <vuln:product>cpe:/a:alcatel-lucent:omnipcx:9.0::enterprise</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0344</vuln:cve-id>
    <vuln:published-datetime>2011-03-08T16:59:33.733-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.010-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=896" xml:lang="en">20110301 Alcatel-Lucent OmniPCX Enterprise CS CGI Cookie Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.alcatel-lucent.com/wps/DocumentStreamerServlet?LMSG_CABINET=Corporate&amp;LMSG_CONTENT_FILE=Support/Security/2011001.pdf" xml:lang="en">http://www.alcatel-lucent.com/wps/DocumentStreamerServlet?LMSG_CABINET=Corporate&amp;LMSG_CONTENT_FILE=Support/Security/2011001.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46640" xml:lang="en">46640</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0549" xml:lang="en">ADV-2011-0549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65849" xml:lang="en">omnipcx-unified-maintenance-bo(65849)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple stack-based buffer overflows in unspecified CGI programs in the Unified Maintenance Tool web interface in the embedded web server in the Communication Server (CS) in Alcatel-Lucent OmniPCX Enterprise before R9.0 H1.301.50 allow remote attackers to execute arbitrary code via crafted HTTP headers.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0345">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnivista:4760_r5.0.07.05"/>
        <cpe-lang:fact-ref name="cpe:/a:alcatel-lucent:omnivista:4760_r5.1.06.03"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:alcatel-lucent:omnivista:4760_r5.0.07.05</vuln:product>
      <vuln:product>cpe:/a:alcatel-lucent:omnivista:4760_r5.1.06.03</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0345</vuln:cve-id>
    <vuln:published-datetime>2011-03-08T16:59:33.857-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:41.200-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.3</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://seclists.org/fulldisclosure/2011/Mar/8" xml:lang="en">20110301 DDIVRT-2010-30 Alcatel-Lucent OmniVista 4760 NMS 'lang' Directory Traversal Vulnerability [ CVE-2011-0345 ]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8122" xml:lang="en">8122</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.alcatel-lucent.com/wps/DocumentStreamerServlet?LMSG_CABINET=Corporate&amp;LMSG_CONTENT_FILE=Support/Security/2011002.pdf" xml:lang="en">http://www.alcatel-lucent.com/wps/DocumentStreamerServlet?LMSG_CABINET=Corporate&amp;LMSG_CONTENT_FILE=Support/Security/2011002.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516768/100/0/threaded" xml:lang="en">20110301 DDIVRT-2010-30 Alcatel-Lucent OmniVista 4760 NMS 'lang' Directory Traversal Vulnerability [ CVE-2011-0345 ]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46624" xml:lang="en">46624</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0548" xml:lang="en">ADV-2011-0548</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65848" xml:lang="en">omnivista-lang-file-include(65848)</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in the NMS server in Alcatel-Lucent OmniVista 4760 R5.1.06.03 and earlier allows remote attackers to read arbitrary files via directory traversal sequences in HTTP GET requests, related to the lang variable.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0346">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2:sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:r2:sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:7</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0346</vuln:cve-id>
    <vuln:published-datetime>2011-01-07T18:00:20.093-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11882" name="oval:org.mitre.oval:def:11882"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0698.html" xml:lang="en">20110101 Announcing cross_fuzz, a potential 0-day in circulation, and more</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx" xml:lang="en">http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html" xml:lang="en">http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt" xml:lang="en">http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lcamtuf.coredump.cx/cross_fuzz/known_vuln.txt" xml:lang="en">http://lcamtuf.coredump.cx/cross_fuzz/known_vuln.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lcamtuf.coredump.cx/cross_fuzz/msie_crash.txt" xml:lang="en">http://lcamtuf.coredump.cx/cross_fuzz/msie_crash.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/427980" xml:lang="en">VU#427980</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515506/100/0/threaded" xml:lang="en">20110101 Announcing cross_fuzz, a potential 0-day in circulation, and more</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45639" xml:lang="en">45639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024940" xml:lang="en">1024940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA11-102A.html" xml:lang="en">TA11-102A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0026" xml:lang="en">ADV-2011-0026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018" xml:lang="en">MS11-018</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64482" xml:lang="en">ms-ie-releaseinterface-code-execution(64482)</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the ReleaseInterface function in MSHTML.DLL in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the DOM implementation and the BreakAASpecial and BreakCircularMemoryReferences functions, as demonstrated by cross_fuzz, aka "MSHTML Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0347">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0347</vuln:cve-id>
    <vuln:published-datetime>2011-01-07T18:00:20.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:43.997-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12514" name="oval:org.mitre.oval:def:12514"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0698.html" xml:lang="en">20110101 Announcing cross_fuzz, a potential 0-day in circulation, and more</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx" xml:lang="en">http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html" xml:lang="en">http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt" xml:lang="en">http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lcamtuf.coredump.cx/cross_fuzz/msie_display.jpg" xml:lang="en">http://lcamtuf.coredump.cx/cross_fuzz/msie_display.jpg</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.microsoft.com/technet/security/advisory/2490606.mspx" xml:lang="en">http://www.microsoft.com/technet/security/advisory/2490606.mspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515506/100/0/threaded" xml:lang="en">20110101 Announcing cross_fuzz, a potential 0-day in circulation, and more</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64571" xml:lang="en">ms-ie-gui-weak-security(64571)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer on Windows XP allows remote attackers to trigger an incorrect GUI display and have unspecified other impact via vectors related to the DOM implementation, as demonstrated by cross_fuzz.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0348">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2811%29md"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2815%29md"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2822%29md"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2822%29mda"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2824%29md"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2824%29md1"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2824%29mda"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:content_services_gateway_second_generation"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.4%2811%29md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2815%29md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2822%29md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2822%29mda</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2824%29md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2824%29md1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2824%29mda</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0348</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T17:00:05.787-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.277-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024992" xml:lang="en">1024992</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml" xml:lang="en">20110126 Cisco Content Services Gateway Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46022" xml:lang="en">46022</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0229" xml:lang="en">ADV-2011-0229</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64936" xml:lang="en">cisco-csg2-policy-security-bypass(64936)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco IOS 12.4(11)MD, 12.4(15)MD, 12.4(22)MD, 12.4(24)MD before 12.4(24)MD3, 12.4(22)MDA before 12.4(22)MDA5, and 12.4(24)MDA before 12.4(24)MDA3 on the Cisco Content Services Gateway Second Generation (aka CSG2) allows remote attackers to bypass intended access restrictions and intended billing restrictions by sending HTTP traffic to a restricted destination after sending HTTP traffic to an unrestricted destination, aka Bug ID CSCtk35917.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0349">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2824%29md"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2824%29md1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:content_services_gateway_second_generation"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.4%2824%29md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2824%29md1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0349</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T17:00:05.817-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.323-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024992" xml:lang="en">1024992</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml" xml:lang="en">20110126 Cisco Content Services Gateway Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46026" xml:lang="en">46026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0229" xml:lang="en">ADV-2011-0229</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64937" xml:lang="en">cisco-csg2-tcp-dos(64937)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco IOS 12.4(24)MD before 12.4(24)MD2 on the Cisco Content Services Gateway Second Generation (aka CSG2) allows remote attackers to cause a denial of service (device hang or reload) via crafted TCP packets, aka Bug ID CSCth17178, a different vulnerability than CVE-2011-0350.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0350">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2824%29md"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2824%29md1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:content_services_gateway_second_generation"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.4%2824%29md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2824%29md1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0350</vuln:cve-id>
    <vuln:published-datetime>2011-01-28T17:00:05.863-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.383-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024992" xml:lang="en">1024992</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6791d.shtml" xml:lang="en">20110126 Cisco Content Services Gateway Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46028" xml:lang="en">46028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0229" xml:lang="en">ADV-2011-0229</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64938" xml:lang="en">cisco-csg2-tcp-packets-dos(64938)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco IOS 12.4(24)MD before 12.4(24)MD2 on the Cisco Content Services Gateway Second Generation (aka CSG2) allows remote attackers to cause a denial of service (device hang or reload) via crafted TCP packets, aka Bug ID CSCth41891, a different vulnerability than CVE-2011-0349.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0352">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:linksys_wrt54gc_router"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:linksys_wrt54gc_router_firmware:1.02.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:linksys_wrt54gc_router_firmware:1.02.8"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:linksys_wrt54gc_router_firmware:1.05.7"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:linksys_wrt54gc_router_firmware:1.02.5</vuln:product>
      <vuln:product>cpe:/a:cisco:linksys_wrt54gc_router_firmware:1.02.8</vuln:product>
      <vuln:product>cpe:/a:cisco:linksys_wrt54gc_router_firmware:1.05.7</vuln:product>
      <vuln:product>cpe:/h:cisco:linksys_wrt54gc_router</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0352</vuln:cve-id>
    <vuln:published-datetime>2011-01-24T13:00:04.190-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.447-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN26605630/index.html" xml:lang="en">JVN#26605630</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000007.html" xml:lang="en">JVNDB-2011-000007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tools.cisco.com/security/center/viewAlert.x?alertId=22228" xml:lang="en">http://tools.cisco.com/security/center/viewAlert.x?alertId=22228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0205" xml:lang="en">ADV-2011-0205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64850" xml:lang="en">wrt54gc-interface-bo(64850)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the web-based management interface on the Cisco Linksys WRT54GC router with firmware before 1.06.1 allows remote attackers to cause a denial of service (device crash) via a long string in a POST request.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0354">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_endpoint:tc2.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_endpoint:tc3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_endpoint:tc3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_endpoint:tc3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_endpoint:tc3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_endpoint:tc3.1.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:tandberg_endpoint:c20"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:tandberg_endpoint:c40"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:tandberg_endpoint:c60"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:tandberg_endpoint:c90"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:tandberg_personal_video_unit:ex90"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:te1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:te2.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:te2.2.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:tandberg_personal_video_unit:e20"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:tandberg_personal_video_unit:ex60"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:tandberg_endpoint:tc2.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_endpoint:tc3.0.0</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_endpoint:tc3.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_endpoint:tc3.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_endpoint:tc3.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_endpoint:tc3.1.3</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_personal_video_unit_software:tc3.1.3</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_personal_video_unit_software:te1.0.1</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_personal_video_unit_software:te2.2.0</vuln:product>
      <vuln:product>cpe:/a:cisco:tandberg_personal_video_unit_software:te2.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:tandberg_endpoint:c20</vuln:product>
      <vuln:product>cpe:/h:cisco:tandberg_endpoint:c40</vuln:product>
      <vuln:product>cpe:/h:cisco:tandberg_endpoint:c60</vuln:product>
      <vuln:product>cpe:/h:cisco:tandberg_endpoint:c90</vuln:product>
      <vuln:product>cpe:/h:cisco:tandberg_personal_video_unit:e20</vuln:product>
      <vuln:product>cpe:/h:cisco:tandberg_personal_video_unit:ex60</vuln:product>
      <vuln:product>cpe:/h:cisco:tandberg_personal_video_unit:ex90</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0354</vuln:cve-id>
    <vuln:published-datetime>2011-02-03T11:00:02.570-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-09-21T23:28:02.133-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8060" xml:lang="en">8060</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025017" xml:lang="en">1025017</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tools.cisco.com/security/center/viewAlert.x?alertId=22314" xml:lang="en">http://tools.cisco.com/security/center/viewAlert.x?alertId=22314</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/ps11422/products_security_advisory09186a0080b69541.shtml" xml:lang="en">20110202 Default Credentials for Root Account on Tandberg E, EX and C Series Endpoints</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/16100" xml:lang="en">16100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/436854" xml:lang="en">VU#436854</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46107" xml:lang="en">46107</vuln:reference>
    </vuln:references>
    <vuln:summary>The default configuration of Cisco Tandberg C Series Endpoints, and Tandberg E and EX Personal Video units, with software before TC4.0.0 has a blank password for the root account, which makes it easier for remote attackers to obtain access via an unspecified login method.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0355">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%281%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%283%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%283a%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%283b%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:vmware:esx:4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:vmware:esx:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:vmware:esxi:4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:vmware:esxi:4.1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%283%29</vuln:product>
      <vuln:product>cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%283a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:1000v_virtual_ethernet_module_%28vem%29:4.0%284%29:sv1%283b%29</vuln:product>
      <vuln:product>cpe:/a:vmware:esx:4.0</vuln:product>
      <vuln:product>cpe:/a:vmware:esx:4.1</vuln:product>
      <vuln:product>cpe:/a:vmware:esxi:4.0</vuln:product>
      <vuln:product>cpe:/a:vmware:esxi:4.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0355</vuln:cve-id>
    <vuln:published-datetime>2011-02-17T13:00:03.557-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:44.983-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2011/000118.html" xml:lang="en">[security-announce] 20110207 VMSA-2011-0002 Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8090" xml:lang="en">8090</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025030" xml:lang="en">1025030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html" xml:lang="en">http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_0_4_s_v_1_3_c/release/notes/n1000v_rn.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516259/100/0/threaded" xml:lang="en">20110208 VMSA-2011-0002 Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46247" xml:lang="en">46247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2011-0002.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2011-0002.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0314" xml:lang="en">ADV-2011-0314</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0315" xml:lang="en">ADV-2011-0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65217" xml:lang="en">cisco-nexus-packets-dos(65217)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco Nexus 1000V Virtual Ethernet Module (VEM) 4.0(4) SV1(1) through SV1(3b), as used in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, does not properly handle dropped packets, which allows guest OS users to cause a denial of service (ESX or ESXi host OS crash) by sending an 802.1Q tagged packet over an access vEthernet port, aka Cisco Bug ID CSCtj17451.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0364">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:security_agent:5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:security_agent:5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:security_agent:6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:security_agent:5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:security_agent:5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:security_agent:6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0364</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T20:00:02.337-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:46.170-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8095" xml:lang="en">8095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8197" xml:lang="en">8197</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8205" xml:lang="en">8205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6cee6.shtml" xml:lang="en">20110216 Management Center for Cisco Security Agent Remote Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516505/100/0/threaded" xml:lang="en">20110217 ZDI-11-088: Cisco Security Agent Management st_upload Remote Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46420" xml:lang="en">46420</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025088" xml:lang="en">1025088</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0424" xml:lang="en">ADV-2011-0424</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-11-088" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-11-088</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65436" xml:lang="en">cisco-security-webagent-file-upload(65436)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Management Console (webagent.exe) in Cisco Security Agent 5.1, 5.2, and 6.0 before 6.0.2.145 allows remote attackers to create arbitrary files and execute arbitrary code via unspecified parameters in a crafted st_upload request.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0372">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0372</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:01.557-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:31.393-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:summary>The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31640.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0373">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0373</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:17.633-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:31.673-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:summary>The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31685.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0374">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0374</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:17.727-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:31.893-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:summary>The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCtb31659.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0375">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.8</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0375</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.087-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:32.157-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:summary>The CGI implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allows remote authenticated users to execute arbitrary commands via a malformed request, related to "command injection vulnerabilities," aka Bug ID CSCth24671.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0376">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.1</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0376</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.167-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:32.393-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:summary>The TFTP implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x, 1.6.0, and 1.6.1 allows remote attackers to obtain sensitive information via a GET request, aka Bug ID CSCte43876.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0377">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.8</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0377</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.243-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.633-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65616" xml:lang="en">cisco-endpoint-ipaddress-dos(65616)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x allow remote attackers to cause a denial of service (service crash) via a malformed SOAP request in conjunction with a spoofed TelePresence Manager that supplies an invalid IP address, aka Bug ID CSCth03605.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0378">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0378</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.307-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-30T23:29:32.907-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>8.3</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:summary>The XML-RPC implementation on Cisco TelePresence endpoint devices with software 1.2.x through 1.5.x allows remote attackers to execute arbitrary commands via a TCP request, related to a "command injection vulnerability," aka Bug ID CSCtb52587.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0379">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:1.6.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:5500_series_adaptive_security_appliance"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5500"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1100"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_1300_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_3200_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.4.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.5.13"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_system_software:1.6.8"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_system_500_series"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.2.0.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.4.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.10</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.11</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.12</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.5.13</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.7</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_system_software:1.6.8</vuln:product>
      <vuln:product>cpe:/h:cisco:5500_series_adaptive_security_appliance</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5500</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1100</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_1300_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3000</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_3200_series</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_system_500_series</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0379</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.383-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-08T23:32:54.883-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.9</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Manager</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e152.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Endpoint Devices</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025111" xml:lang="en">1025111</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025112" xml:lang="en">1025112</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 1.6.x; Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x; Cisco TelePresence endpoint devices with software 1.2.x through 1.6.x; and Cisco TelePresence Manager 1.2.x, 1.3.x, 1.4.x, 1.5.x, and 1.6.2 allows remote attackers to execute arbitrary code via a crafted Cisco Discovery Protocol packet, aka Bug IDs CSCtd75769, CSCtd75766, CSCtd75754, and CSCtd75761.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0380">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.2.0.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0380</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.477-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.697-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Manager</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46526" xml:lang="en">46526</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025111" xml:lang="en">1025111</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65618" xml:lang="en">telepresence-soap-security-bypass(65618)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco TelePresence Manager 1.2.x through 1.6.x allows remote attackers to bypass authentication and invoke arbitrary methods via a malformed SOAP request, aka Bug ID CSCtc59562.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0381">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_manager:1.6.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.2.0.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.3.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_manager:1.6.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0381</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.527-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.760-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14f.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Manager</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46526" xml:lang="en">46526</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025111" xml:lang="en">1025111</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65619" xml:lang="en">telepresence-manager-rmi-command-exec(65619)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco TelePresence Manager 1.2.x through 1.6.x allows remote attackers to perform unspecified actions and consequently execute arbitrary code via a crafted request to the Java RMI interface, related to a "command injection vulnerability," aka Bug ID CSCtf97085.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0382">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_recording_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.1</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_recording_server</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0382</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.570-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-08T23:32:55.463-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46522" xml:lang="en">46522</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:summary>The CGI subsystem on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 allows remote attackers to execute arbitrary commands via a request to TCP port 443, related to a "command injection vulnerability," aka Bug ID CSCtf97221.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0383">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_recording_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.1</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_recording_server</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0383</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.603-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.823-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46519" xml:lang="en">46519</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65602" xml:lang="en">telepresence-java-unauth-access(65602)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0384">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0384</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.680-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.883-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46520" xml:lang="en">46520</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65620" xml:lang="en">cisco-switch-java-unauth-access(65620)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0385">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_recording_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_recording_server</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0385</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.727-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:27.947-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65604" xml:lang="en">telepresence-interface-file-upload(65604)</vuln:reference>
    </vuln:references>
    <vuln:summary>The administrative web interface on Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote attackers to create or overwrite arbitrary files, and possibly execute arbitrary code, via a crafted request, aka Bug IDs CSCth85786 and CSCth61065.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0386">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.7.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_recording_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.7.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.7.1</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_recording_server</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0386</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.790-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.010-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46522" xml:lang="en">46522</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65605" xml:lang="en">telepresence-xmlrpc-file-overwrite(65605)</vuln:reference>
    </vuln:references>
    <vuln:summary>The XML-RPC implementation on Cisco TelePresence Recording Server devices with software 1.6.x and 1.7.x before 1.7.1 allows remote attackers to overwrite files and consequently execute arbitrary code via a malformed request, aka Bug ID CSCti50739.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0387">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0387</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.837-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.073-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>8.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46520" xml:lang="en">46520</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65621" xml:lang="en">cisco-multipoint-interface-dos(65621)</vuln:reference>
    </vuln:references>
    <vuln:summary>The administrative web interface on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allows remote authenticated users to cause a denial of service or have unspecified other impact via vectors involving access to a servlet, aka Bug ID CSCtf97164.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0388">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_recording_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_recording_server</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0388</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.900-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-08T23:32:57.277-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46523" xml:lang="en">46523</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco TelePresence Recording Server devices with software 1.6.x and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x do not properly restrict remote access to the Java servlet RMI interface, which allows remote attackers to cause a denial of service (memory consumption and web outage) via multiple crafted requests, aka Bug IDs CSCtg35830 and CSCtg35825.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0389">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0389</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:18.963-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.133-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46520" xml:lang="en">46520</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65622" xml:lang="en">cisco-multipoint-rtpc-dos(65622)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x allow remote attackers to cause a denial of service (process crash) via a crafted Real-Time Transport Control Protocol (RTCP) UDP packet, aka Bug ID CSCth60993.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0390">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_multipoint_switch_software:1.7.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_multipoint_switch"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.0.4.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.5</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.5.6</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.3</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.6.4</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_multipoint_switch_software:1.7.0</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_multipoint_switch</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0390</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:19.010-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.197-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14e.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Multipoint Switch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46520" xml:lang="en">46520</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025113" xml:lang="en">1025113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65623" xml:lang="en">telepresence-multipoint-xmlrpc-dos(65623)</vuln:reference>
    </vuln:references>
    <vuln:summary>The XML-RPC implementation on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, 1.6.x, and 1.7.0 allows remote attackers to cause a denial of service (process crash) via a crafted request, aka Bug ID CSCtj44534.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0391">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_recording_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_recording_server</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0391</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:19.057-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.260-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46522" xml:lang="en">46522</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65607" xml:lang="en">telepresence-adhoc-dos(65607)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco TelePresence Recording Server devices with software 1.6.x allow remote attackers to cause a denial of service (thread consumption and device outage) via a malformed request, related to an "ad hoc recording" issue, aka Bug ID CSCtf97205.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0392">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:telepresence_recording_server_software:1.6.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:telepresence_recording_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.2</vuln:product>
      <vuln:product>cpe:/a:cisco:telepresence_recording_server_software:1.6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:telepresence_recording_server</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0392</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:19.103-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.323-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e11d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco TelePresence Recording Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46522" xml:lang="en">46522</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025114" xml:lang="en">1025114</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65609" xml:lang="en">telepresence-xmlrpc-security-bypass(65609)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco TelePresence Recording Server devices with software 1.6.x do not require authentication for an XML-RPC interface, which allows remote attackers to perform unspecified actions via a session on TCP port 8080, aka Bug ID CSCtg35833.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0393">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%280%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%284%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%285%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%285.2%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%286.7%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.8:interim"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.5%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.27%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.48%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.49%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%285%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%281.22%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.5%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.7%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.8%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.10%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.14%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.15%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.16%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.17%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.18%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.19%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.48%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%283%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%283.9%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%284%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2.2:interim"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:5500_series_adaptive_security_appliance"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5500"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:pix_500"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%280%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%284%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%285%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%285.2%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%286.7%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.1.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.4.3</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.5</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.6</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.7</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.8</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.8:interim</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.5%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.27%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.48%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.49%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%285%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%281.22%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.5%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.7%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.8%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.10%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.14%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.15%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.16%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.17%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.18%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.19%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.48%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.5</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.3</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.5</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%283%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%283.9%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%284%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2.2:interim</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29</vuln:product>
      <vuln:product>cpe:/h:cisco:5500_series_adaptive_security_appliance</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5500</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_500</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0393</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:19.167-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.383-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025108" xml:lang="en">1025108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0493" xml:lang="en">ADV-2011-0493</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65589" xml:lang="en">asa-packet-buffer-dos(65589)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.12), 7.1 and 7.2 before 7.2(5.2), 8.0 before 8.0(5.21), 8.1 before 8.1(2.49), 8.2 before 8.2(3.6), and 8.3 before 8.3(2.7) and Cisco PIX Security Appliances 500 series devices, when transparent firewall mode is configured but IPv6 is not configured, allow remote attackers to cause a denial of service (packet buffer exhaustion and device outage) via IPv6 traffic, aka Bug ID CSCtj04707.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0394">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%280%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%284%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%285%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%285.2%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0%286.7%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.4.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.0.8:interim"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.5%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.27%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.48%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.49%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1%285%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%281.22%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.5%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.7%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.8%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.10%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.14%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.15%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.16%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.17%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.18%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.19%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.48%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:7.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%283%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%283.9%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2%284%29"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.2.2:interim"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.1%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.1%282%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:5500_series_adaptive_security_appliance"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5500"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:pix_500"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.1"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.1%285%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.1%286%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.1%2816%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.1%2817%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.1%2818%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.1%2819%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.2"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.2%283%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.2%2813%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.2%2814%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:3.2%2816%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%284%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%286%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%287%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%288%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%2810%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%2811%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%2812%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%2813%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.0%2814%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.1"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.1%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.1%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.1%283%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:firewall_services_module_software:4.1%284%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%280%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%284%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%285%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%285.2%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0%286.7%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.1.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.4.3</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.5</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.6</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.7</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.8</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.0.8:interim</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.5%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.27%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.48%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%282.49%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1%285%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%281.22%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.5%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.7%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.8%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.10%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.14%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.15%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.16%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.17%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.18%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.19%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2%282.48%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.3</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:7.2.5</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.3</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.4</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0.5</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%283%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%283.9%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2%284%29</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2.1</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2.2</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.2.2:interim</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29</vuln:product>
      <vuln:product>cpe:/h:cisco:5500_series_adaptive_security_appliance</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5500</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_500</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.1%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.1%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.1</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.1%285%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.1%286%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.1%2816%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.1%2817%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.1%2818%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.1%2819%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.2</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.2%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.2%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.2%283%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.2%2813%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.2%2814%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:3.2%2816%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%284%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%286%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%287%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%288%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%2810%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%2811%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%2812%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%2813%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.0%2814%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.1</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.1%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.1%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.1%283%29</vuln:product>
      <vuln:product>cpe:/o:cisco:firewall_services_module_software:4.1%284%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0394</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:19.213-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.477-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" xml:lang="en">20110223 Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46518" xml:lang="en">46518</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025108" xml:lang="en">1025108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025109" xml:lang="en">1025109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0493" xml:lang="en">ADV-2011-0493</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0494" xml:lang="en">ADV-2011-0494</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" xml:lang="en">cisco-fwsm-sccp-dos(65593)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0395">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%283%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%284%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%285%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.1%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.1%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.2"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5505"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5510"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5520"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5540"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5550"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5580"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_501"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_506e"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_506"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_515"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_520"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_525"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_535"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5500</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5505</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5510</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5520</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5540</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5550</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5580</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_500</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_501</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_506e</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_506</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_515</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_520</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_525</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_535</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%283%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%284%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%285%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.1%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.1%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.2</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.2%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.2%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0395</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:19.260-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:27.200-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025108" xml:lang="en">1025108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0493" xml:lang="en">ADV-2011-0493</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65590" xml:lang="en">asa-rip-dos(65590)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.20), 8.1 before 8.1(2.48), 8.2 before 8.2(3), and 8.3 before 8.3(2.1), when the RIP protocol and the Cisco Phone Proxy functionality are configured, allow remote attackers to cause a denial of service (device reload) via a RIP update, aka Bug ID CSCtg66583.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0396">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%283%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%284%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.0%285%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.1%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.1%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.2"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/o:cisco:adaptive_security_appliance:8.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5505"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5510"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5520"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5540"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5550"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:asa_5580"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_501"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_506e"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_506"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_515"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_520"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_525"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:pix_firewall_535"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.0</vuln:product>
      <vuln:product>cpe:/a:cisco:adaptive_security_appliance_software:8.3%281%29</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5500</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5505</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5510</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5520</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5540</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5550</vuln:product>
      <vuln:product>cpe:/h:cisco:asa_5580</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_500</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_501</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_506e</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_506</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_515</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_520</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_525</vuln:product>
      <vuln:product>cpe:/h:cisco:pix_firewall_535</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%283%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%284%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.0%285%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.1%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.1%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.2</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.2%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.2%282%29</vuln:product>
      <vuln:product>cpe:/o:cisco:adaptive_security_appliance:8.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0396</vuln:cve-id>
    <vuln:published-datetime>2011-02-25T07:00:19.307-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:27.200-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" xml:lang="en">20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025108" xml:lang="en">1025108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0493" xml:lang="en">ADV-2011-0493</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65591" xml:lang="en">asa-ca-unauth-access(65591)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.0 before 8.0(5.23), 8.1 before 8.1(2.49), 8.2 before 8.2(4.1), and 8.3 before 8.3(2.13), when a Certificate Authority (CA) is configured, allow remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCtk12352.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0398">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.32"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.34"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.35"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.36"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.37"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:piwik:piwik:0.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.11</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.12</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.13</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.14</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.16</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.17</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.18</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.19</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.20</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.22</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.23</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.24</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.25</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.26</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.27</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.28</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.29</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.30</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.31</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.32</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.33</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.34</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.35</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.36</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.37</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0398</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T15:00:17.140-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.667-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dev.piwik.org/trac/ticket/567" xml:lang="en">http://dev.piwik.org/trac/ticket/567</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://piwik.org/blog/2011/01/piwik-1-1-2/" xml:lang="en">http://piwik.org/blog/2011/01/piwik-1-1-2/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45787" xml:lang="en">45787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64641" xml:lang="en">piwik-piwikcommongetip-security-bypass(64641)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Piwik_Common::getIP function in Piwik before 1.1 does not properly determine the client IP address, which allows remote attackers to bypass intended geolocation and logging functionality via (1) use of a private (aka RFC 1918) address behind a proxy server or (2) spoofing of the X-Forwarded-For HTTP header.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0399">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.32"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.34"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.35"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.36"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.37"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:piwik:piwik:0.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.11</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.12</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.13</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.14</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.16</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.17</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.18</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.19</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.20</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.22</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.23</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.24</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.25</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.26</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.27</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.28</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.29</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.30</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.31</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.32</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.33</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.34</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.35</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.36</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.37</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0399</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T15:00:17.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.727-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dev.piwik.org/trac/ticket/1679" xml:lang="en">http://dev.piwik.org/trac/ticket/1679</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://piwik.org/blog/2011/01/piwik-1-1-2/" xml:lang="en">http://piwik.org/blog/2011/01/piwik-1-1-2/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45787" xml:lang="en">45787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64640" xml:lang="en">piwik-loginform-clickjacking(64640)</vuln:reference>
    </vuln:references>
    <vuln:summary>Piwik before 1.1 does not prevent the rendering of the login form inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0400">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.32"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.34"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.35"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.36"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.37"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:piwik:piwik:0.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.11</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.12</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.13</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.14</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.16</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.17</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.18</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.19</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.20</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.22</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.23</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.24</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.25</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.26</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.27</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.28</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.29</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.30</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.31</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.32</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.33</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.34</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.35</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.36</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.37</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0400</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T15:00:17.423-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.807-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dev.piwik.org/trac/ticket/1795" xml:lang="en">http://dev.piwik.org/trac/ticket/1795</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://piwik.org/blog/2011/01/piwik-1-1-2/" xml:lang="en">http://piwik.org/blog/2011/01/piwik-1-1-2/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45787" xml:lang="en">45787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64639" xml:lang="en">piwik-cookie-weak-security(64639)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cookie.php in Piwik before 1.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0401">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.32"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.34"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.35"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.36"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.2.37"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:piwik:piwik:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:piwik:piwik:0.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.1.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.10</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.11</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.12</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.13</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.14</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.16</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.17</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.18</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.19</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.20</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.22</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.23</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.24</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.25</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.26</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.27</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.28</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.29</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.30</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.31</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.32</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.33</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.34</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.35</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.36</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.2.37</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4:rc3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.1:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.4.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.5.5</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc1</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.3:rc2</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.6.4</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.7</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.8</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:0.9.9</vuln:product>
      <vuln:product>cpe:/a:piwik:piwik:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0401</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T15:00:17.470-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.870-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dev.piwik.org/trac/ticket/1279#comment:13" xml:lang="en">http://dev.piwik.org/trac/ticket/1279#comment:13</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dev.piwik.org/trac/ticket/1910" xml:lang="en">http://dev.piwik.org/trac/ticket/1910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://piwik.org/blog/2011/01/piwik-1-1-2/" xml:lang="en">http://piwik.org/blog/2011/01/piwik-1-1-2/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45787" xml:lang="en">45787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64638" xml:lang="en">piwik-sessions-dos(64638)</vuln:reference>
    </vuln:references>
    <vuln:summary>Piwik before 1.1 does not properly limit the number of files stored under tmp/sessions/, which might allow remote attackers to cause a denial of service (inode consumption) by establishing many sessions.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0402">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.9.19"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.9.20"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.9.21"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.5"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.6"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.7"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.8"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.9"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.10"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.11"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.12"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.13"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.14"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.15"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.16"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.17"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.18"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.19"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.20"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.21"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.22"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.23"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.24"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.25"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.26"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.27"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.10.28"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.0"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.3"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.4"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.5"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.6"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.7"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.8"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.9"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.10"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.11"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.12"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.13"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.14"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.15"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.16"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.17"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.18"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.19"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.20"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.21"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.22"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.23"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.24"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.13.25"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.0"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.3"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.4"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.5"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.6"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.7"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.8"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.9"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.10"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.11"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.12"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.13"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.14"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.15"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.16"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.16.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.16.4"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.16.5"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.16.6"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.17"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.18"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.19"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.20"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.21"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.22"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.23"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.24"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.25"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.26"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.27"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.28"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.29"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.14.30"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.0"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.4"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.5"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.6"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.7"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:debian:dpkg:1.15.8.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:debian:dpkg:1.9.19</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.9.20</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.9.21</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.3</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.4</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.5</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.6</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.7</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.8</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.9</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.10</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.11</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.12</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.13</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.14</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.15</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.16</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.17</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.18</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.18.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.19</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.20</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.21</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.22</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.23</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.24</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.25</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.26</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.27</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.10.28</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.0</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.3</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.4</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.5</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.6</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.7</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.8</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.9</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.10</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.11</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.11.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.12</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.13</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.14</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.15</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.16</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.17</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.18</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.19</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.20</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.21</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.22</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.23</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.24</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.13.25</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.0</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.3</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.4</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.5</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.6</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.7</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.8</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.9</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.10</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.11</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.12</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.13</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.14</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.15</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.16</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.16.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.16.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.16.3</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.16.4</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.16.5</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.16.6</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.17</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.18</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.19</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.20</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.21</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.22</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.23</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.24</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.25</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.26</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.27</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.28</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.29</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.14.30</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.0</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.3</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.3.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.4</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.4.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.5</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.5.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.5.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.5.3</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.5.4</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.5.5</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.5.6</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.6</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.6.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.7</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.7.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.7.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.1</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.2</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.3</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.4</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.5</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.6</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.7</vuln:product>
      <vuln:product>cpe:/a:debian:dpkg:1.15.8.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0402</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:05.423-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:28.947-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html" xml:lang="en">FEDORA-2011-0362</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html" xml:lang="en">FEDORA-2011-0345</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2142" xml:lang="en">DSA-2142</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45703" xml:lang="en">45703</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1038-1" xml:lang="en">USN-1038-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0040" xml:lang="en">ADV-2011-0040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0044" xml:lang="en">ADV-2011-0044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0196" xml:lang="en">ADV-2011-0196</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64614" xml:lang="en">dpkg-dpkgsource-symlink(64614)</vuln:reference>
    </vuln:references>
    <vuln:summary>dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0403">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:1.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:1.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:1.2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:1.3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.4.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.4.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.4.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.5.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.5.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:imgburn:imgburn:2.5.4.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:imgburn:imgburn:1.0.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:1.1.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:1.2.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:1.3.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.1.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.2.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.3.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.3.1.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.3.2.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.4.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.4.1.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.4.2.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.4.3.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.4.4.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.5.0.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.5.1.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.5.2.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.5.3.0</vuln:product>
      <vuln:product>cpe:/a:imgburn:imgburn:2.5.4.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0403</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:05.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.010-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstormsecurity.org/files/view/97207/imgburn-dllhijack.txt" xml:lang="en">http://packetstormsecurity.org/files/view/97207/imgburn-dllhijack.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45657" xml:lang="en">45657</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64478" xml:lang="en">imgburn-dll-code-execution(64478)</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in ImgBurn.exe in ImgBurn 2.4.0.0, 2.5.4.0, and other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a CUE file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0404">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:netsupport:netsupport_manager_agent:9.50::solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:netsupport:netsupport_manager_agent:11.00::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:netsupport:netsupport_manager_agent:11.00::mac_os_x"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:netsupport:netsupport_manager_agent:9.50::solaris</vuln:product>
      <vuln:product>cpe:/a:netsupport:netsupport_manager_agent:11.00::linux</vuln:product>
      <vuln:product>cpe:/a:netsupport:netsupport_manager_agent:11.00::mac_os_x</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0404</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:05.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.073-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2011-01/0090.html" xml:lang="en">20110108 NetSupport Manager Agent Remote Buffer Overflow (Linux, Solaris, Mac, ...)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/15937" xml:lang="en">15937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/16838" xml:lang="en">16838</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ikkisoft.com/stuff/netsupport_linux.txt" xml:lang="en">http://www.ikkisoft.com/stuff/netsupport_linux.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45728" xml:lang="en">45728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024943" xml:lang="en">1024943</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0062" xml:lang="en">ADV-2011-0062</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64546" xml:lang="en">netsupport-manager-client-bo(64546)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in NetSupport Manager Agent for Linux 11.00, for Solaris 9.50, and for Mac OS X 11.00 allows remote attackers to execute arbitrary code via a long control hostname to TCP port 5405, probably a different vulnerability than CVE-2007-5252.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0405">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpgedview:phpgedview:4.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpgedview:phpgedview:4.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0405</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:05.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.133-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/projects/phpgedview/forums/forum/185166/topic/4040059" xml:lang="en">http://sourceforge.net/projects/phpgedview/forums/forum/185166/topic/4040059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/tracker/?func=detail&amp;aid=3152857&amp;group_id=55456&amp;atid=477081" xml:lang="en">http://sourceforge.net/tracker/?func=detail&amp;aid=3152857&amp;group_id=55456&amp;atid=477081</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/15913" xml:lang="en">15913</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45674" xml:lang="en">45674</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0036" xml:lang="en">ADV-2011-0036</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64733" xml:lang="en">phpgedview-module-file-include(64733)</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in module.php in PhpGedView 4.2.3 and possibly other versions, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via directory traversal sequences in the pgvaction parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0406">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wellintech:kingview:6.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wellintech:kingview:6.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0406</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:06.000-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.213-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8134" xml:lang="en">8134</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html" xml:lang="en">http://thesauceofutterpwnage.blogspot.com/2011/01/waking-up-sleeping-dragon.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108" xml:lang="en">http://www.cnnvd.org.cn/showCnnvd.html?id=2011010108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/15957" xml:lang="en">15957</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/180119" xml:lang="en">VU#180119</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kingview.com/news/detail.aspx?contentid=528" xml:lang="en">http://www.kingview.com/news/detail.aspx?contentid=528</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45727" xml:lang="en">45727</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0063" xml:lang="en">ADV-2011-0063</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64559" xml:lang="en">kingview-historysvr-bo(64559)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0407">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phenotype-cms:phenotype_cms:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phenotype-cms:phenotype_cms:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0407</vuln:cve-id>
    <vuln:published-datetime>2011-01-10T22:00:06.110-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:47.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.htbridge.ch/advisory/sql_injection_in_phenotype_cms.html" xml:lang="en">http://www.htbridge.ch/advisory/sql_injection_in_phenotype_cms.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515577/100/0/threaded" xml:lang="en">20110106 SQL Injection in Phenotype CMS</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45700" xml:lang="en">45700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64538" xml:lang="en">phenotypecms-uri-sql-injection(64538)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the store function in _phenotype/system/class/PhenoTypeDataObject.class.php in Phenotype CMS 3.0 allows remote attackers to execute arbitrary SQL commands via a crafted URI, as demonstrated by Gallery/gal_id/1/image1,1.html.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0408">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.5.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:libpng:libpng:1.5.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0408</vuln:cve-id>
    <vuln:published-datetime>2011-01-18T13:03:08.423-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.307-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024955" xml:lang="en">1024955</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/mailarchive/forum.php?thread_name=002b01cbb0e2%24ae636c80%240b2a4580%24%40acm.org&amp;forum_name=png-mng-implement" xml:lang="en">http://sourceforge.net/mailarchive/forum.php?thread_name=002b01cbb0e2%24ae636c80%240b2a4580%24%40acm.org&amp;forum_name=png-mng-implement</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/643140" xml:lang="en">VU#643140</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0080" xml:lang="en">ADV-2011-0080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64637" xml:lang="en">libpng-pngsetrgbtogray-bo(64637)</vuln:reference>
    </vuln:references>
    <vuln:summary>pngrtran.c in libpng 1.5.x before 1.5.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted palette-based PNG image that triggers a buffer overflow, related to the png_do_expand_palette function, the png_do_rgb_to_gray function, and an integer underflow.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0410">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:collabnet:scrumworks:1.8.4:basic"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:collabnet:scrumworks:1.8.4:basic</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0410</vuln:cve-id>
    <vuln:published-datetime>2011-01-24T13:00:04.237-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.370-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/547167" xml:lang="en">VU#547167</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64883" xml:lang="en">scrumworks-base64-info-disclosure(64883)</vuln:reference>
    </vuln:references>
    <vuln:summary>CollabNet ScrumWorks Basic 1.8.4 uses cleartext credentials for network communication and the internal database, which makes it easier for context-dependent attackers to obtain sensitive information by (1) sniffing the network for transmissions of Java objects or (2) reading the database.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0411">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.11"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.12"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.13"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.14"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.4.15"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.5.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.6.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:postfix:postfix:2.7.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:postfix:postfix:2.4</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.0</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.1</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.2</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.3</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.4</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.5</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.6</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.7</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.8</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.9</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.10</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.11</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.12</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.13</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.14</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.4.15</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.0</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.1</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.2</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.3</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.4</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.5</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.6</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.7</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.8</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.9</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.10</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.5.11</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.0</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.1</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.2</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.3</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.4</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.5</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.6</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.7</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.6.8</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.7.0</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.7.1</vuln:product>
      <vuln:product>cpe:/a:postfix:postfix:2.7.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0411</vuln:cve-id>
    <vuln:published-datetime>2011-03-16T18:55:02.717-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.447-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10705" xml:lang="en">http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10705</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html" xml:lang="en">FEDORA-2011-3394</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html" xml:lang="en">FEDORA-2011-3355</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" xml:lang="en">SUSE-SR:2011:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-201206-33.xml" xml:lang="en">GLSA-201206-33</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025179" xml:lang="en">1025179</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2233" xml:lang="en">DSA-2233</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/555316" xml:lang="en">VU#555316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/MORO-8ELH6Z" xml:lang="en">http://www.kb.cert.org/vuls/id/MORO-8ELH6Z</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.postfix.org/CVE-2011-0411.html" xml:lang="en">http://www.postfix.org/CVE-2011-0411.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0422.html" xml:lang="en">RHSA-2011:0422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0423.html" xml:lang="en">RHSA-2011:0423</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46767" xml:lang="en">46767</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0611" xml:lang="en">ADV-2011-0611</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0752" xml:lang="en">ADV-2011-0752</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0891" xml:lang="en">ADV-2011-0891</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65932" xml:lang="en">multiple-starttls-command-execution(65932)</vuln:reference>
    </vuln:references>
    <vuln:summary>The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0412">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:sunos:5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:sunos:5.9"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:sunos:5.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:sunos:5.8</vuln:product>
      <vuln:product>cpe:/o:sun:sunos:5.9</vuln:product>
      <vuln:product>cpe:/o:sun:sunos:5.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0412</vuln:cve-id>
    <vuln:published-datetime>2011-04-19T15:55:01.767-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.510-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/648244" xml:lang="en">VU#648244</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47171" xml:lang="en">47171</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0882" xml:lang="en">ADV-2011-0882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66579" xml:lang="en">solaris-password-info-disclosure(66579)</vuln:reference>
    </vuln:references>
    <vuln:summary>Oracle Solaris 8, 9, and 10 stores back-out patch files (undo.Z) unencrypted with world-readable permissions under /var/sadm/pkg/, which allows local users to obtain password hashes and conduct brute force password guessing attacks.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0413">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.1:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.2:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.2:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.2:b3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.3:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0.3:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.1:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.1:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.1:b3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0-esv"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1-esv"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.2.0:a1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.2.0:a2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.2.0:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.2.0:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.2.0:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.2.0:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:isc:dhcp:4.0</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0-esv</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.0</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.1:b1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.1:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.2</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.2:b1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.2:b2</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.2:b3</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.2:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.3</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.3:b1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0.3:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1-esv</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.0</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.1:b1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.1:b2</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.1:b3</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.1:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.2</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.2.0</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.2.0:a1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.2.0:a2</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.2.0:b1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.2.0:b2</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.2.0:p1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.2.0:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0413</vuln:cve-id>
    <vuln:published-datetime>2011-01-31T16:00:18.110-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.587-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053644.html" xml:lang="en">FEDORA-2011-0862</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1024999" xml:lang="en">1024999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2184" xml:lang="en">DSA-2184</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.isc.org/software/dhcp/advisories/cve-2011-0413" xml:lang="en">http://www.isc.org/software/dhcp/advisories/cve-2011-0413</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/686084" xml:lang="en">VU#686084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:022" xml:lang="en">MDVSA-2011:022</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0256.html" xml:lang="en">RHSA-2011:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46035" xml:lang="en">46035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0235" xml:lang="en">ADV-2011-0235</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0266" xml:lang="en">ADV-2011-0266</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0300" xml:lang="en">ADV-2011-0300</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0400" xml:lang="en">ADV-2011-0400</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0583" xml:lang="en">ADV-2011-0583</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64959" xml:lang="en">dhcp-dhcpv6-dos(64959)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://kb.isc.org/article/AA-00456" xml:lang="en">https://kb.isc.org/article/AA-00456</vuln:reference>
    </vuln:references>
    <vuln:summary>The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0414">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.1:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.1:p2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.2:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.2:p2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.2:p3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.7.2:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:isc:bind:9.7.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.1:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.1:p2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.1:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.2:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.2:p2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.2:p3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.7.2:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0414</vuln:cve-id>
    <vuln:published-datetime>2011-02-23T14:00:01.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:26:56.437-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2208" xml:lang="en">DSA-2208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.isc.org/software/bind/advisories/cve-2011-0414" xml:lang="en">http://www.isc.org/software/bind/advisories/cve-2011-0414</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/449980" xml:lang="en">VU#449980</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/559980" xml:lang="en">VU#559980</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025110" xml:lang="en">1025110</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1070-1" xml:lang="en">USN-1070-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0466" xml:lang="en">ADV-2011-0466</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0489" xml:lang="en">ADV-2011-0489</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=679496" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=679496</vuln:reference>
    </vuln:references>
    <vuln:summary>ISC BIND 9.7.1 through 9.7.2-P3, when configured as an authoritative server, allows remote attackers to cause a denial of service (deadlock and daemon hang) by sending a query at the time of (1) an IXFR transfer or (2) a DDNS update.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0418">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.94"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.95"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.95-pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.95-pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.95-pre3"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.95-pre4"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.95.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.95.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.96"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.96.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.96pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97-final"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.3"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.4"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.5"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.6"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.7"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.7pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.7pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97.7pre3"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97pre3"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97pre4"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.97pre5"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98-final"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.2a"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.3"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.4"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.5"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.6"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98.7"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.98pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.1a"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.2a"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.3"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.4"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99.9"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99a"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99b"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:0.99pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.13a"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.16a"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.16b"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.16c"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.17a"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.24"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.26"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.27"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.30"/>
        <cpe-lang:fact-ref name="cpe:/a:pureftpd:pure-ftpd:1.0.31"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:netbsd:netbsd:5.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.90</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.91</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.92</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.93</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.94</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.95</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.95-pre1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.95-pre2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.95-pre3</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.95-pre4</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.95.1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.95.2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.96</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.96.1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.96pre1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97-final</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.3</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.4</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.5</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.6</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.7</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.7pre1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.7pre2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97.7pre3</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97pre1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97pre2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97pre3</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97pre4</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.97pre5</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98-final</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.2a</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.3</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.4</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.5</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.6</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98.7</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98pre1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.98pre2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.1a</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.1b</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.2a</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.3</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.4</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99.9</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99a</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99b</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99pre1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:0.99pre2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.0</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.1</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.2</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.3</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.4</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.5</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.6</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.7</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.8</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.9</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.10</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.11</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.12</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.13a</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.14</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.15</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.16a</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.16b</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.16c</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.17</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.17a</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.18</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.19</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.20</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.21</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.22</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.24</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.25</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.26</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.27</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.28</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.29</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.30</vuln:product>
      <vuln:product>cpe:/a:pureftpd:pure-ftpd:1.0.31</vuln:product>
      <vuln:product>cpe:/o:netbsd:netbsd:5.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0418</vuln:cve-id>
    <vuln:published-datetime>2011-05-24T19:55:01.653-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-09-21T23:28:09.147-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c#rev1.28" xml:lang="en">http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c#rev1.28</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&amp;r2=1.28&amp;f=h" xml:lang="en">http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/glob.c.diff?r1=1.27&amp;r2=1.28&amp;f=h</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/97" xml:lang="en">20110502 Multiple Vendors libc/glob(3) GLOB_BRACE|GLOB_LIMIT memory exhaustion</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8228" xml:lang="en">8228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:094" xml:lang="en">MDVSA-2011:094</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.pureftpd.org/project/pure-ftpd/news" xml:lang="en">http://www.pureftpd.org/project/pure-ftpd/news</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47671" xml:lang="en">47671</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/1273" xml:lang="en">ADV-2011-1273</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=704283" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=704283</vuln:reference>
    </vuln:references>
    <vuln:summary>The glob implementation in Pure-FTPd before 1.0.32, and in libc in NetBSD 5.1, does not properly expand expressions containing curly brackets, which allows remote authenticated users to cause a denial of service (memory consumption) via a crafted FTP STAT command.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0419">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.2-dev"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.3-dev"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.7-dev"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:0.9.16-dev"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.4-dev"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.6-dev"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.3.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:portable_runtime:1.4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:0.8.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:0.8.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.29"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.30"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.31"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.32"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.33"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.34"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.35"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.36"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.37"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.38"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.39"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.41"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.42"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.65"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.3.68"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:1.99"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.28:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.32"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.32:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.34:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.35"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.36"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.37"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.38"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.39"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.40"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.41"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.42"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.43"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.44"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.45"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.46"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.47"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.48"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.49"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.50"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.51"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.52"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.53"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.54"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.55"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.56"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.57"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.58"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.59"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.60"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.61"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.0.63"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:http_server:2.2.17"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd"/>
        <cpe-lang:fact-ref name="cpe:/o:google:android"/>
        <cpe-lang:fact-ref name="cpe:/o:netbsd:netbsd:5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:oracle:solaris:10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:http_server:0.8.11</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:0.8.14</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.0</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.0.5</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.1</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.2</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.9</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.10</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.11</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.12</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.13</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.14</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.15</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.16</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.17</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.18</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.19</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.20</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.22</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.23</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.24</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.25</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.26</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.27</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.28</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.29</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.30</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.31</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.32</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.33</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.34</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.35</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.36</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.37</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.38</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.39</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.41</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.42</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.65</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.3.68</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.4.0</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:1.99</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.9</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.28</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.28:beta</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.32</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.32:beta</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.34:beta</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.35</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.36</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.37</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.38</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.39</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.40</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.41</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.42</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.43</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.44</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.45</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.46</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.47</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.48</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.49</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.50</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.51</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.52</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.53</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.54</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.55</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.56</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.57</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.58</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.59</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.60</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.61</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.0.63</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.3</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.4</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.5</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.6</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.7</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.8</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.1.9</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.0</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.1</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.2</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.3</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.4</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.6</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.8</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.9</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.10</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.11</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.12</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.13</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.14</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.15</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.16</vuln:product>
      <vuln:product>cpe:/a:apache:http_server:2.2.17</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.1</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.2</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.2-dev</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.3</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.3-dev</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.4</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.5</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.6</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.7</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.7-dev</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.8</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.9</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:0.9.16-dev</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.4-dev</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.6-dev</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.9</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.10</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.11</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.12</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.3.13</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.4.0</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.4.1</vuln:product>
      <vuln:product>cpe:/a:apache:portable_runtime:1.4.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.6.0</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd</vuln:product>
      <vuln:product>cpe:/o:google:android</vuln:product>
      <vuln:product>cpe:/o:netbsd:netbsd:5.1</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.8</vuln:product>
      <vuln:product>cpe:/o:oracle:solaris:10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0419</vuln:cve-id>
    <vuln:published-datetime>2011-05-16T13:55:02.387-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-01-05T21:29:01.253-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14638" name="oval:org.mitre.oval:def:14638"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14804" name="oval:org.mitre.oval:def:14804"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/fnmatch.c#rev1.22" xml:lang="en">http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gen/fnmatch.c#rev1.22</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://cxib.net/stuff/apache.fnmatch.phps" xml:lang="en">http://cxib.net/stuff/apache.fnmatch.phps</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://cxib.net/stuff/apr_fnmatch.txts" xml:lang="en">http://cxib.net/stuff/apr_fnmatch.txts</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://httpd.apache.org/security/vulnerabilities_22.html" xml:lang="en">http://httpd.apache.org/security/vulnerabilities_22.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html" xml:lang="en">SUSE-SU-2011:1229</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=131551295528105&amp;w=2" xml:lang="en">HPSBUX02702</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=131731002122529&amp;w=2" xml:lang="en">HPSBUX02707</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=132033751509019&amp;w=2" xml:lang="en">SSRT100619</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=134987041210674&amp;w=2" xml:lang="en">SSRT100966</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECUNIA</vuln:source>
      <vuln:reference href="http://secunia.com/advisories/48308" xml:lang="en">48308</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/98" xml:lang="en">20110512 Multiple Vendors libc/fnmatch(3) DoS (incl apache)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8246" xml:lang="en">8246</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025527" xml:lang="en">1025527</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&amp;r2=1098902" xml:lang="en">http://svn.apache.org/viewvc/apr/apr/branches/1.4.x/strings/apr_fnmatch.c?r1=731029&amp;r2=1098902</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?view=revision&amp;revision=1098188" xml:lang="en">http://svn.apache.org/viewvc?view=revision&amp;revision=1098188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?view=revision&amp;revision=1098799" xml:lang="en">http://svn.apache.org/viewvc?view=revision&amp;revision=1098799</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.apache.org/dist/apr/Announcement1.x.html" xml:lang="en">http://www.apache.org/dist/apr/Announcement1.x.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.apache.org/dist/apr/CHANGES-APR-1.4" xml:lang="en">http://www.apache.org/dist/apr/CHANGES-APR-1.4</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.apache.org/dist/httpd/Announcement2.2.html" xml:lang="en">http://www.apache.org/dist/httpd/Announcement2.2.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2237" xml:lang="en">DSA-2237</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.mail-archive.com/dev@apr.apache.org/msg23960.html" xml:lang="en">[dev] 20110510 Re: fnmatch rewrite in apr, apr 1.4.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.mail-archive.com/dev@apr.apache.org/msg23961.html" xml:lang="en">[dev] 20110510 Re: Apache Portable Runtime 1.4.4 [...] Released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.mail-archive.com/dev@apr.apache.org/msg23976.html" xml:lang="en">[dev] 20110511 Re: Apache Portable Runtime 1.4.4 [...] Released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:084" xml:lang="en">MDVSA-2011:084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" xml:lang="en">MDVSA-2013:150</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fnmatch.c#rev1.15" xml:lang="en">http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fnmatch.c#rev1.15</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0507.html" xml:lang="en">RHSA-2011:0507</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0896.html" xml:lang="en">RHSA-2011:0896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0897.html" xml:lang="en">RHSA-2011:0897</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=703390" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=703390</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E" xml:lang="en">[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E" xml:lang="en">[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0420">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php:php:5.3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0420</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T20:00:02.933-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T16:09:47.890-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/94" xml:lang="en">20110217 PHP 5.3.5 grapheme_extract() NULL Pointer Dereference</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8087" xml:lang="en">8087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://svn.php.net/viewvc/php/php-src/trunk/ext/intl/grapheme/grapheme_string.c?r1=306449&amp;r2=306448&amp;pathrev=306449" xml:lang="en">http://svn.php.net/viewvc/php/php-src/trunk/ext/intl/grapheme/grapheme_string.c?r1=306449&amp;r2=306448&amp;pathrev=306449</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2266" xml:lang="en">DSA-2266</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/16182" xml:lang="en">16182</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/210829" xml:lang="en">VU#210829</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516504/100/0/threaded" xml:lang="en">20110216 PHP 5.3.5 grapheme_extract() NULL Pointer Dereference</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/516518/100/0/threaded" xml:lang="en">20110217 Re: PHP 5.3.5 grapheme_extract() NULL Pointer Dereference</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46429" xml:lang="en">46429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65437" xml:lang="en">php-graphemeextract-dos(65437)</vuln:reference>
    </vuln:references>
    <vuln:summary>The grapheme_extract function in the Internationalization extension (Intl) for ICU for PHP 5.3.5 allows context-dependent attackers to cause a denial of service (crash) via an invalid size argument, which triggers a NULL pointer dereference.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0421">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:php:php:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:2.0b10"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:3.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0:beta_4_patch1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.4::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php:php:1.0</vuln:product>
      <vuln:product>cpe:/a:php:php:2.0</vuln:product>
      <vuln:product>cpe:/a:php:php:2.0b10</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.1</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.2</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.3</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.4</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.5</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.6</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.7</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.8</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.9</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.10</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.11</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.12</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.13</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.14</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.15</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.16</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.17</vuln:product>
      <vuln:product>cpe:/a:php:php:3.0.18</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0:beta_4_patch1</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.0</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.1</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.2</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.3</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.4</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.5</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.6</vuln:product>
      <vuln:product>cpe:/a:php:php:4.0.7</vuln:product>
      <vuln:product>cpe:/a:php:php:4.1.0</vuln:product>
      <vuln:product>cpe:/a:php:php:4.1.1</vuln:product>
      <vuln:product>cpe:/a:php:php:4.1.2</vuln:product>
      <vuln:product>cpe:/a:php:php:4.2.0</vuln:product>
      <vuln:product>cpe:/a:php:php:4.2.1</vuln:product>
      <vuln:product>cpe:/a:php:php:4.2.2</vuln:product>
      <vuln:product>cpe:/a:php:php:4.2.3</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.0</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.1</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.2</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.3</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.4</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.5</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.6</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.7</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.8</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.9</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.10</vuln:product>
      <vuln:product>cpe:/a:php:php:4.3.11</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.0</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.1</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.2</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.3</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.4</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.5</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.6</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.7</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.8</vuln:product>
      <vuln:product>cpe:/a:php:php:4.4.9</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.0:rc3</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.1</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.2</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.3</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.4</vuln:product>
      <vuln:product>cpe:/a:php:php:5.0.5</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.0</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.1</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.2</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.3</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.4</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.5</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.6</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.0</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.1</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.2</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.3</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.4</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.4::windows</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.5</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.6</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.7</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.8</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.9</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.10</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.11</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.12</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.13</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.14</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.15</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.16</vuln:product>
      <vuln:product>cpe:/a:php:php:5.2.17</vuln:product>
      <vuln:product>cpe:/a:php:php:5.3.0</vuln:product>
      <vuln:product>cpe:/a:php:php:5.3.1</vuln:product>
      <vuln:product>cpe:/a:php:php:5.3.2</vuln:product>
      <vuln:product>cpe:/a:php:php:5.3.3</vuln:product>
      <vuln:product>cpe:/a:php:php:5.3.4</vuln:product>
      <vuln:product>cpe:/a:php:php:5.3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0421</vuln:cve-id>
    <vuln:published-datetime>2011-03-19T22:00:03.377-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:26:21.043-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.php.net/bug.php?id=53885" xml:lang="en">http://bugs.php.net/bug.php?id=53885</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html" xml:lang="en">APPLE-SA-2011-10-12-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057709.html" xml:lang="en">FEDORA-2011-3636</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057710.html" xml:lang="en">FEDORA-2011-3666</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056642.html" xml:lang="en">FEDORA-2011-3614</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" xml:lang="en">SUSE-SR:2011:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=133469208622507&amp;w=2" xml:lang="en">HPSBOV02763</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/96" xml:lang="en">20110318 libzip 0.9.3 _zip_name_locate NULL Pointer Dereference (incl PHP 5.3.5)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8146" xml:lang="en">8146</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT5002" xml:lang="en">http://support.apple.com/kb/HT5002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.php.net/viewvc/?view=revision&amp;revision=307867" xml:lang="en">http://svn.php.net/viewvc/?view=revision&amp;revision=307867</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2266" xml:lang="en">DSA-2266</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/17004" xml:lang="en">17004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:052" xml:lang="en">MDVSA-2011:052</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:053" xml:lang="en">MDVSA-2011:053</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:099" xml:lang="en">MDVSA-2011:099</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.php.net/archive/2011.php" xml:lang="en">http://www.php.net/archive/2011.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.php.net/ChangeLog-5.php" xml:lang="en">http://www.php.net/ChangeLog-5.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.php.net/releases/5_3_6.php" xml:lang="en">http://www.php.net/releases/5_3_6.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/517065/100/0/threaded" xml:lang="en">20110318 libzip 0.9.3 _zip_name_locate NULL Pointer Dereference (incl PHP 5.3.5)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46354" xml:lang="en">46354</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0744" xml:lang="en">ADV-2011-0744</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0764" xml:lang="en">ADV-2011-0764</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0890" xml:lang="en">ADV-2011-0890</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=688735" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=688735</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66173" xml:lang="en">libzip-zipnamelocate-dos(66173)</vuln:reference>
    </vuln:references>
    <vuln:summary>The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0423">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:polyvision:roomwizard_firmware:3.2.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:polyvision:roomwizard"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:polyvision:roomwizard_firmware:3.2.3</vuln:product>
      <vuln:product>cpe:/h:polyvision:roomwizard</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0423</vuln:cve-id>
    <vuln:published-datetime>2011-01-11T20:00:02.353-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.853-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt" xml:lang="en">http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://seclists.org/fulldisclosure/2011/Jan/58" xml:lang="en">20110106 RoomWizard Default Password and Sync Connector Credential Leak [CVE-2010-0214]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/870601" xml:lang="en">VU#870601</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45699" xml:lang="en">45699</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0059" xml:lang="en">ADV-2011-0059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64543" xml:lang="en">roomwizard-password-security-bypass(64543)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64642" xml:lang="en">roomwizard-default-password(64642)</vuln:reference>
    </vuln:references>
    <vuln:summary>The PolyVision RoomWizard with firmware 3.2.3 has a default password of roomwizard for the administrator account, which makes it easier for remote attackers to obtain console access via an HTTP session, a different vulnerability than CVE-2010-0214.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0426">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vmware:vcenter:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vcenter:4.0:update_1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vcenter:4.0:update_2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vcenter:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:virtualcenter:2.5:update_1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:virtualcenter:2.5:update_2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:virtualcenter:2.5:update_3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:virtualcenter:2.5:update_4"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:virtualcenter:2.5:update_5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:virtualcenter:2.5:update_6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vmware:vcenter:4.0</vuln:product>
      <vuln:product>cpe:/a:vmware:vcenter:4.0:update_1</vuln:product>
      <vuln:product>cpe:/a:vmware:vcenter:4.0:update_2</vuln:product>
      <vuln:product>cpe:/a:vmware:vcenter:4.1</vuln:product>
      <vuln:product>cpe:/a:vmware:virtualcenter:2.5:update_1</vuln:product>
      <vuln:product>cpe:/a:vmware:virtualcenter:2.5:update_2</vuln:product>
      <vuln:product>cpe:/a:vmware:virtualcenter:2.5:update_3</vuln:product>
      <vuln:product>cpe:/a:vmware:virtualcenter:2.5:update_4</vuln:product>
      <vuln:product>cpe:/a:vmware:virtualcenter:2.5:update_5</vuln:product>
      <vuln:product>cpe:/a:vmware:virtualcenter:2.5:update_6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0426</vuln:cve-id>
    <vuln:published-datetime>2011-05-09T18:55:01.333-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-05-27T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-05-10T13:32:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2011/000137.html" xml:lang="en">[security-announce] 20110505 VMSA-2011-0008 VMware vCenter Server and vSphere Client security vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025502" xml:lang="en">1025502</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2011-0008.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2011-0008.html</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in vCenter Server in VMware vCenter 4.0 before Update 3 and 4.1 before Update 1, and VMware VirtualCenter 2.5 before Update 6a, allows remote attackers to read arbitrary files via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0427">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre24"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre27"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.1:alpha-cvs"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.8:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.20:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.21:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.22:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.23:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.24:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.25:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.26:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.27:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.28:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.32:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.33"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.34:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.35"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.2.20:alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tor:tor:0.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre24</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre27</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.1:alpha-cvs</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.8:beta</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.30</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.31</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.20:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.21:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.22:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.23:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.24:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.25:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.26:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.27:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.28:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.32:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.33</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.34:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.35</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.24</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.27</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.28</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.2.20:alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0427</vuln:cve-id>
    <vuln:published-datetime>2011-01-19T07:00:19.750-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:29.930-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://archives.seul.org/or/announce/Jan-2011/msg00000.html" xml:lang="en">[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blog.torproject.org/blog/tor-02129-released-security-patches" xml:lang="en">http://blog.torproject.org/blog/tor-02129-released-security-patches</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2148" xml:lang="en">DSA-2148</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45832" xml:lang="en">45832</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024980" xml:lang="en">1024980</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0131" xml:lang="en">ADV-2011-0131</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0132" xml:lang="en">ADV-2011-0132</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" xml:lang="en">tor-unspec-bo(64748)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" xml:lang="en">https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0430">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openafs:openafs:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:openafs:openafs:1.4.12"/>
        <cpe-lang:fact-ref name="cpe:/a:openafs:openafs:1.4.14"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openafs:openafs:1.4.7</vuln:product>
      <vuln:product>cpe:/a:openafs:openafs:1.4.12</vuln:product>
      <vuln:product>cpe:/a:openafs:openafs:1.4.14</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0430</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T20:00:03.057-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2013-07-10T16:01:02.203-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2168" xml:lang="en">DSA-2168</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46428" xml:lang="en">46428</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025095" xml:lang="en">1025095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0410" xml:lang="en">ADV-2011-0410</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0411" xml:lang="en">ADV-2011-0411</vuln:reference>
    </vuln:references>
    <vuln:summary>Double free vulnerability in the Rx server process in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions allows remote attackers to cause a denial of service and execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0431">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openafs:openafs:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:openafs:openafs:1.4.12"/>
        <cpe-lang:fact-ref name="cpe:/a:openafs:openafs:1.4.14"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openafs:openafs:1.4.7</vuln:product>
      <vuln:product>cpe:/a:openafs:openafs:1.4.12</vuln:product>
      <vuln:product>cpe:/a:openafs:openafs:1.4.14</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0431</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T20:00:03.167-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-10T22:50:41.113-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2168" xml:lang="en">DSA-2168</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46428" xml:lang="en">46428</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025095" xml:lang="en">1025095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0410" xml:lang="en">ADV-2011-0410</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0411" xml:lang="en">ADV-2011-0411</vuln:reference>
    </vuln:references>
    <vuln:summary>The afs_linux_lock function in afs/LINUX/osi_vnodeops.c in the kernel module in OpenAFS 1.4.14, 1.4.12, 1.4.7, and possibly other versions does not properly handle errors, which allows attackers to cause a denial of service via unknown vectors.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0432">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_pamies:pywebdav:0.9.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.3</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.5</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.5.1</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.6</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.7</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.8</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.9.1</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.9.2</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.9.3</vuln:product>
      <vuln:product>cpe:/a:simon_pamies:pywebdav:0.9.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0432</vuln:cve-id>
    <vuln:published-datetime>2011-03-14T15:55:00.777-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-15T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-15T09:08:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/pywebdav/updates/list" xml:lang="en">http://code.google.com/p/pywebdav/updates/list</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055412.html" xml:lang="en">FEDORA-2011-2460</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055413.html" xml:lang="en">FEDORA-2011-2470</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055444.html" xml:lang="en">FEDORA-2011-2427</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://pywebdav.googlecode.com/files/PyWebDAV-0.9.4.1.tar.gz" xml:lang="en">http://pywebdav.googlecode.com/files/PyWebDAV-0.9.4.1.tar.gz</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2177" xml:lang="en">DSA-2177</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46655" xml:lang="en">46655</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0553" xml:lang="en">ADV-2011-0553</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0554" xml:lang="en">ADV-2011-0554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0634" xml:lang="en">ADV-2011-0634</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=677718" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=677718</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in the get_userinfo method in the MySQLAuthHandler class in DAVServer/mysqlauth.py in PyWebDAV before 0.9.4.1 allow remote attackers to execute arbitrary SQL commands via the (1) user or (2) pw argument.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0433">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gnome:evince:-"/>
        <cpe-lang:fact-ref name="cpe:/a:t1lib:t1lib"/>
        <cpe-lang:fact-ref name="cpe:/a:tetex:tetex:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gnome:evince:-</vuln:product>
      <vuln:product>cpe:/a:t1lib:t1lib</vuln:product>
      <vuln:product>cpe:/a:tetex:tetex:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0433</vuln:cve-id>
    <vuln:published-datetime>2012-11-19T07:10:48.477-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-06-30T21:29:00.700-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2012-1201.html" xml:lang="en">RHSA-2012:1201</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:144" xml:lang="en">MDVSA-2012:144</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://xorl.wordpress.com/2011/02/20/cve-2011-0433-evince-linetoken-buffer-overflow/" xml:lang="en">http://xorl.wordpress.com/2011/02/20/cve-2011-0433-evince-linetoken-buffer-overflow/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.gnome.org/show_bug.cgi?id=640923" xml:lang="en">https://bugzilla.gnome.org/show_bug.cgi?id=640923</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=679732" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=679732</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="https://security.gentoo.org/glsa/201701-57" xml:lang="en">GLSA-201701-57</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the linetoken function in afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a DVI file containing a crafted Adobe Font Metrics (AFM) file, a different vulnerability than CVE-2010-2642.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0434">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.24.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.27.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.14"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.15"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.16"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.17"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.18"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.20"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.5"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.24.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.27.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.14</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.15</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.16</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.17</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.18</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.20</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.5</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0434</vuln:cve-id>
    <vuln:published-datetime>2011-03-07T16:00:01.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.010-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=89da9c519b04cda1b23e6290d2b0a6cea1bae31e" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=89da9c519b04cda1b23e6290d2b0a6cea1bae31e</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=e94e8b9cc354bfcaeb284d5331b815256bb46162" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=e94e8b9cc354bfcaeb284d5331b815256bb46162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2179" xml:lang="en">DSA-2179</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.gplhost.sg/lists/dtcannounce/msg00025.html" xml:lang="en">[dtcannounce] 20110303 Fwd: [SECURITY] [DSA 2179-1] dtc security update</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0556" xml:lang="en">ADV-2011-0556</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65895" xml:lang="en">dtc-cid-sql-injection(65895)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in Domain Technologie Control (DTC) before 0.32.9 allow remote attackers to execute arbitrary SQL commands via the cid parameter to (1) admin/bw_per_month.php or (2) client/bw_per_month.php.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0435">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.24.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.27.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.14"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.15"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.16"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.17"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.18"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.20"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.5"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.24.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.27.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.14</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.15</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.16</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.17</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.18</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.20</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.5</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0435</vuln:cve-id>
    <vuln:published-datetime>2011-03-07T16:00:01.673-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.087-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=89da9c519b04cda1b23e6290d2b0a6cea1bae31e" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=89da9c519b04cda1b23e6290d2b0a6cea1bae31e</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=e94e8b9cc354bfcaeb284d5331b815256bb46162" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=e94e8b9cc354bfcaeb284d5331b815256bb46162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2179" xml:lang="en">DSA-2179</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.gplhost.sg/lists/dtcannounce/msg00025.html" xml:lang="en">[dtcannounce] 20110303 Fwd: [SECURITY] [DSA 2179-1] dtc security update</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0556" xml:lang="en">ADV-2011-0556</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65896" xml:lang="en">dtc-bwpermonth-info-disc(65896)</vuln:reference>
    </vuln:references>
    <vuln:summary>Domain Technologie Control (DTC) before 0.32.9 does not require authentication for (1) admin/bw_per_month.php and (2) client/bw_per_month.php, which allows remote attackers to obtain potentially sensitive bandwidth information via a direct request.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0436">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.24.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.27.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.14"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.15"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.16"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.17"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.18"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.20"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.5"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.24.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.27.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.14</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.15</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.16</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.17</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.18</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.20</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.5</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0436</vuln:cve-id>
    <vuln:published-datetime>2011-03-07T16:00:01.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.150-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614302</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=adffff7efb3687ff465ee0552a944dd3109f3cb0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=f8e3b2d7cc2da313addc05394568ab9599499285</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2011/02/22/1" xml:lang="en">[oss-security] 20110222 CVE-2011-0436: dtc sends password of new users to site admin by unencrypted email</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2179" xml:lang="en">DSA-2179</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.gplhost.sg/lists/dtcannounce/msg00025.html" xml:lang="en">[dtcannounce] 20110303 Fwd: [SECURITY] [DSA 2179-1] dtc security update</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0556" xml:lang="en">ADV-2011-0556</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65898" xml:lang="en">dtc-passwords-info-disc(65898)</vuln:reference>
    </vuln:references>
    <vuln:summary>The register_user function in client/new_account_form.php in Domain Technologie Control (DTC) before 0.32.9 includes a cleartext password in an e-mail message, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0437">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.24.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.25.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.27.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.14"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.15"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.16"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.17"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.18"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.30.20"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.4"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.5"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.6"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.32.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.24.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.25.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.27.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.14</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.15</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.16</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.17</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.18</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.30.20</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.4</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.5</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.6</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.32.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0437</vuln:cve-id>
    <vuln:published-datetime>2011-03-07T16:00:01.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.213-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=9b75112fc12fead5740b1aaf0df562b5a9045ec0" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=9b75112fc12fead5740b1aaf0df562b5a9045ec0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=c97ab4ae43945de36534c40004d713b3b10113db" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commit;h=c97ab4ae43945de36534c40004d713b3b10113db</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.29.17-1+lenny1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/d/dtc/dtc_0.32.10-1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2179" xml:lang="en">DSA-2179</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.gplhost.sg/lists/dtcannounce/msg00025.html" xml:lang="en">[dtcannounce] 20110303 Fwd: [SECURITY] [DSA 2179-1] dtc security update</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0556" xml:lang="en">ADV-2011-0556</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65897" xml:lang="en">dtc-ssh-sec-bypass(65897)</vuln:reference>
    </vuln:references>
    <vuln:summary>shared/inc/sql/ssh.php in the SSH accounts management implementation in Domain Technologie Control (DTC) before 0.32.9 allows remote authenticated users to delete arbitrary accounts via the edssh_account parameter in a deletesshaccount Delete action.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0438">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:arthurdejong:nss-pam-ldapd:0.8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:arthurdejong:nss-pam-ldapd:0.8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0438</vuln:cve-id>
    <vuln:published-datetime>2011-03-15T13:55:03.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.290-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://arthurdejong.org/nss-pam-ldapd/news.html#20110309" xml:lang="en">http://arthurdejong.org/nss-pam-ldapd/news.html#20110309</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lists.arthurdejong.org/nss-pam-ldapd-announce/2011/attachments/txtVf3rHgt8qQ.txt" xml:lang="en">http://lists.arthurdejong.org/nss-pam-ldapd-announce/2011/attachments/txtVf3rHgt8qQ.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.arthurdejong.org/nss-pam-ldapd-announce/2011/msg00000.html" xml:lang="en">[nss-pam-ldapd-announce] 20110309 nss-pam-ldapd security advisory (CVE-2011-0438)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8132" xml:lang="en">8132</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46819" xml:lang="en">46819</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66028" xml:lang="en">nsspamldapd-pam-sec-bypass(66028)</vuln:reference>
    </vuln:references>
    <vuln:summary>nslcd/pam.c in the nss-pam-ldapd 0.8.0 PAM module returns a success code when a user is not found in LDAP, which allows remote attackers to bypass authentication.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0439">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:alpha2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:alpha3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:alpha1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:alpha2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:alpha3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.5</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.6</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0439</vuln:cve-id>
    <vuln:published-datetime>2011-03-28T12:55:04.153-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.353-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mahara.org/interaction/forum/topic.php?id=3205" xml:lang="en">http://mahara.org/interaction/forum/topic.php?id=3205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mahara.org/interaction/forum/topic.php?id=3208" xml:lang="en">http://mahara.org/interaction/forum/topic.php?id=3208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2206" xml:lang="en">DSA-2206</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47033" xml:lang="en">47033</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66327" xml:lang="en">mahara-pieform-xss(66327)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Mahara 1.2.x before 1.2.7 and 1.3.x before 1.3.4 allows remote attackers to inject arbitrary web script or HTML via the Pieforms select box.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0440">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:alpha2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:alpha3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.2.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.3.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:alpha1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:alpha2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:alpha3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.5</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.2.6</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.3.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0440</vuln:cve-id>
    <vuln:published-datetime>2011-03-28T12:55:04.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.417-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mahara.org/interaction/forum/topic.php?id=3206" xml:lang="en">http://mahara.org/interaction/forum/topic.php?id=3206</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mahara.org/interaction/forum/topic.php?id=3208" xml:lang="en">http://mahara.org/interaction/forum/topic.php?id=3208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2206" xml:lang="en">DSA-2206</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47033" xml:lang="en">47033</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66326" xml:lang="en">mahara-blogposts-csrf(66326)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in Mahara 1.2.x before 1.2.7 and 1.3.x before 1.3.4 allows remote attackers to hijack the authentication of arbitrary users for requests that delete blogs.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0441">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:php:php:5.3.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php:php:5.3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0441</vuln:cve-id>
    <vuln:published-datetime>2011-03-29T14:55:01.537-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.463-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.3</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618489" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=618489</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.debian.org/?p=pkg-php/php.git;a=commit;h=d09fd04ed7bfcf7f008360c6a42025108925df09" xml:lang="en">http://git.debian.org/?p=pkg-php/php.git;a=commit;h=d09fd04ed7bfcf7f008360c6a42025108925df09</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:069" xml:lang="en">MDVSA-2011:069</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46928" xml:lang="en">46928</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0910" xml:lang="en">ADV-2011-0910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66180" xml:lang="en">php-php5common-file-deletion(66180)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Debian GNU/Linux /etc/cron.d/php5 cron job for PHP 5.3.5 allows local users to delete arbitrary files via a symlink attack on a directory under /var/lib/php5/.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0442">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:emc:avamar:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:avamar:5.0:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:avamar:5.0.0-407"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:emc:avamar:5.0</vuln:product>
      <vuln:product>cpe:/a:emc:avamar:5.0:sp1</vuln:product>
      <vuln:product>cpe:/a:emc:avamar:5.0.0-407</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0442</vuln:cve-id>
    <vuln:published-datetime>2011-03-16T18:55:02.763-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-09T15:29:05.500-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8139" xml:lang="en">8139</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/517022/100/0/threaded" xml:lang="en">20110315 ESA-2011-007: EMC Avamar sensitive information disclosure vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46879" xml:lang="en">46879</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025213" xml:lang="en">1025213</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0677" xml:lang="en">ADV-2011-0677</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0678" xml:lang="en">ADV-2011-0678</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66109" xml:lang="en">avamar-service-utility-info-disclosure(66109)</vuln:reference>
    </vuln:references>
    <vuln:summary>The service utility in EMC Avamar 5.x before 5.0.4 uses cleartext to transmit event details in (1) service requests and (2) e-mail messages, which might allow remote attackers to obtain sensitive information by sniffing the network.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0443">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tinybb:tinybb:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tinybb:tinybb:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0443</vuln:cve-id>
    <vuln:published-datetime>2011-01-12T20:00:02.287-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.587-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tinybb.net/forum/?page=thread&amp;post=989525101" xml:lang="en">http://tinybb.net/forum/?page=thread&amp;post=989525101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/15961" xml:lang="en">15961</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45737" xml:lang="en">45737</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1024949" xml:lang="en">1024949</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64570" xml:lang="en">tinybb-index-sql-injection(64570)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in inc/tinybb-settings.php in tinyBB 1.2, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter in a profile action to index.php.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0444">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.2.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.1</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.2</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.3</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.4</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.5</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.6</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.7</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.8</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.9</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.10</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.11</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.12</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.2.13</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.4.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.4.1</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0444</vuln:cve-id>
    <vuln:published-datetime>2011-01-12T20:00:02.553-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:31:59.990-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14283" name="oval:org.mitre.oval:def:14283"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053650.html" xml:lang="en">FEDORA-2011-0450</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053669.html" xml:lang="en">FEDORA-2011-0460</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:007" xml:lang="en">MDVSA-2011:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0369.html" xml:lang="en">RHSA-2011:0369</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45775" xml:lang="en">45775</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0079" xml:lang="en">ADV-2011-0079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0104" xml:lang="en">ADV-2011-0104</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0270" xml:lang="en">ADV-2011-0270</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0719" xml:lang="en">ADV-2011-0719</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wireshark.org/security/wnpa-sec-2011-01.html" xml:lang="en">http://www.wireshark.org/security/wnpa-sec-2011-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wireshark.org/security/wnpa-sec-2011-02.html" xml:lang="en">http://www.wireshark.org/security/wnpa-sec-2011-02.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5676" xml:lang="en">https://bugs.wireshark.org/bugzilla/attachment.cgi?id=5676</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5530" xml:lang="en">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5530</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64624" xml:lang="en">wireshark-maclte-bo(64624)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the MAC-LTE dissector (epan/dissectors/packet-mac-lte.c) in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of RARs.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0445">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wireshark:wireshark:1.4.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.4.1</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0445</vuln:cve-id>
    <vuln:published-datetime>2011-01-12T20:00:02.617-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:00.050-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14505" name="oval:org.mitre.oval:def:14505"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053650.html" xml:lang="en">FEDORA-2011-0450</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053669.html" xml:lang="en">FEDORA-2011-0460</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45775" xml:lang="en">45775</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0079" xml:lang="en">ADV-2011-0079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0270" xml:lang="en">ADV-2011-0270</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wireshark.org/security/wnpa-sec-2011-02.html" xml:lang="en">http://www.wireshark.org/security/wnpa-sec-2011-02.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5537" xml:lang="en">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5537</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64625" xml:lang="en">wireshark-asn1ber-dissector-dos(64625)</vuln:reference>
    </vuln:references>
    <vuln:summary>The ASN.1 BER dissector in Wireshark 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (assertion failure) via crafted packets, as demonstrated by fuzz-2010-12-30-28473.pcap.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0446">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.4:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rubyonrails:rails:2.0.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.0.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.0.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.0.4</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.1.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.1.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.1.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.2.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.2.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.2.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.4</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.9</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.10</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.4:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0446</vuln:cve-id>
    <vuln:published-datetime>2011-02-14T16:00:03.007-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-08-08T11:41:32.003-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-02-15T08:12:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=source&amp;output=gplain" xml:lang="en">[rubyonrails-security] 20110209 Potential XSS Problem with mail_to :encode => :javascript</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html" xml:lang="en">FEDORA-2011-4358</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html" xml:lang="en">FEDORA-2011-2133</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html" xml:lang="en">FEDORA-2011-2138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2247" xml:lang="en">DSA-2247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46291" xml:lang="en">46291</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025064" xml:lang="en">1025064</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0587" xml:lang="en">ADV-2011-0587</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0877" xml:lang="en">ADV-2011-0877</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the mail_to helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0447">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:2.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.4:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rubyonrails:rails:2.1.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.1.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.1.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.2.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.2.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.2.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.4</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.9</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:2.3.10</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.4:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0447</vuln:cve-id>
    <vuln:published-datetime>2011-02-14T16:00:03.087-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-08-08T11:41:32.003-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-02-15T08:36:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&amp;output=gplain" xml:lang="en">[rubyonrails-security] 20110209 CSRF Protection Bypass in Ruby on Rails</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html" xml:lang="en">FEDORA-2011-4358</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html" xml:lang="en">FEDORA-2011-2133</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html" xml:lang="en">FEDORA-2011-2138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails" xml:lang="en">http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2247" xml:lang="en">DSA-2247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46291" xml:lang="en">46291</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025060" xml:lang="en">1025060</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0587" xml:lang="en">ADV-2011-0587</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0877" xml:lang="en">ADV-2011-0877</vuln:reference>
    </vuln:references>
    <vuln:summary>Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0448">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.4:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.4:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0448</vuln:cve-id>
    <vuln:published-datetime>2011-02-21T13:00:01.287-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-08-08T11:41:32.003-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-02-22T09:14:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&amp;output=gplain" xml:lang="en">[rubyonrails-security] 20110209 Potential SQL Injection in Rails 3.0.x</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html" xml:lang="en">FEDORA-2011-4358</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025063" xml:lang="en">1025063</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4" xml:lang="en">http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0877" xml:lang="en">ADV-2011-0877</vuln:reference>
    </vuln:references>
    <vuln:summary>Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0449">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.1:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.2:pre"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rubyonrails:rails:3.0.4:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.1:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.2:pre</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.3</vuln:product>
      <vuln:product>cpe:/a:rubyonrails:rails:3.0.4:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0449</vuln:cve-id>
    <vuln:published-datetime>2011-02-21T13:00:01.363-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-08-08T11:41:32.003-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-02-22T09:33:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&amp;output=gplain" xml:lang="en">[rubyonrails-security] 20110209 Filter Problems on Case-Insensitive Filesystems</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html" xml:lang="en">FEDORA-2011-4358</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025061" xml:lang="en">1025061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4" xml:lang="en">http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0877" xml:lang="en">ADV-2011-0877</vuln:reference>
    </vuln:references>
    <vuln:summary>actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0450">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0:beta3"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0:beta4"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0:beta5"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0:beta6"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0:beta7"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.0:beta8"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.02"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.10"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.11"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:5.12"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.0:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.0:tp1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.0:tp2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.0:tp3"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.1:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.02"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.03"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.04"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.05"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.06"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.11"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:6.12"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.0:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.0:beta1_v2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.01"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.02"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.03"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.10"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.10:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.11"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.11:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.20"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.20:beta7"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.21"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.22"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.23"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.50"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.50:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.51"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.52"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.53"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.54"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.54:update1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.54:update2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:7.60"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.0:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.0:beta3"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.01"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.02"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.50"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.51"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.52"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.53"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:8.54"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.0:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.01"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.02"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.10"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.12"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.20"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.20:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.21"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.22"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.23"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.24"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.25"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.26"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.27"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.50"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.50:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.50:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.51"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.52"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.60"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.60:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.61"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.62"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.63"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:9.64"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.00"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.00:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.00:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.00:beta3"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.01"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.10"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.10:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.50"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.50:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.50:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.51"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.52"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.53"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.53:b"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.54"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.60"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.60:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.61"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.62"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:10.63"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:11.00"/>
          <cpe-lang:fact-ref name="cpe:/a:opera:opera_browser:11.00:beta"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:opera:opera_browser:5.0</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.0:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.0:beta3</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.0:beta4</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.0:beta5</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.0:beta6</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.0:beta7</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.0:beta8</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.02</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.10</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.11</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:5.12</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.0</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.0:tp1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.0:tp2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.0:tp3</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.1:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.02</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.03</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.04</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.05</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.06</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.11</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:6.12</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.0</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.0:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.0:beta1_v2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.0:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.01</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.02</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.03</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.10</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.10:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.11</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.11:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.20</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.20:beta7</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.21</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.22</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.23</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.50</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.50:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.51</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.52</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.53</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.54</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.54:update1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.54:update2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:7.60</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.0</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.0:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.0:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.0:beta3</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.01</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.02</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.50</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.51</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.52</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.53</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:8.54</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.0</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.0:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.0:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.01</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.02</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.10</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.12</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.20</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.20:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.21</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.22</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.23</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.24</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.25</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.26</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.27</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.50</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.50:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.50:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.51</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.52</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.60</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.60:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.61</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.62</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.63</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:9.64</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.00</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.00:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.00:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.00:beta3</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.01</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.10</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.10:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.50</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.50:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.50:beta2</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.51</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.52</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.53</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.53:b</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.54</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.60</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.60:beta1</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.61</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.62</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:10.63</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:11.00</vuln:product>
      <vuln:product>cpe:/a:opera:opera_browser:11.00:beta</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0450</vuln:cve-id>
    <vuln:published-datetime>2011-01-31T15:00:49.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:00.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12369" name="oval:org.mitre.oval:def:12369"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN33880169/index.html" xml:lang="en">JVN#33880169</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000010.html" xml:lang="en">JVNDB-2011-000010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.opera.com/docs/changelogs/windows/1101/" xml:lang="en">http://www.opera.com/docs/changelogs/windows/1101/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.opera.com/support/kb/view/985/" xml:lang="en">http://www.opera.com/support/kb/view/985/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0231" xml:lang="en">ADV-2011-0231</vuln:reference>
    </vuln:references>
    <vuln:summary>The downloads manager in Opera before 11.01 on Windows does not properly determine the pathname of the filesystem-viewing application, which allows user-assisted remote attackers to execute arbitrary code via a crafted web site that hosts an executable file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0451">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.2.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.1:a"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.3.4:community"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.0:a-beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.3:a-beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.3:b-beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.3:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:1.5.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.0.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.0.1:a"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.1.2:a"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.2.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.2.1:one"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.3.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.4.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lockon:ec-cube:2.11.0:beta"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:lockon:ec-cube:1.1.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.1.1</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.2.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.0</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.1</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.1:a</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.2</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.3</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.4</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.3.4:community</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.0:a-beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.1:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.2:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.3:a-beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.3:b-beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.3:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.5</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.6</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.4.7</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:1.5.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.0.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.0.1</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.0.1:a</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.1.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.1.2</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.1.2:a</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.2.0:beta</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.2.1:one</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.3.0</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.3.0:rc1</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.3.1</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.3.3</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.3.4</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.4.0</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.4.0:rc1</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.4.1</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.4.2</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.4.3</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.4.4</vuln:product>
      <vuln:product>cpe:/a:lockon:ec-cube:2.11.0:beta</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0451</vuln:cve-id>
    <vuln:published-datetime>2011-02-03T11:00:04.447-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.760-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN84393059/index.html" xml:lang="en">JVN#84393059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000011.html" xml:lang="en">JVNDB-2011-000011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.ec-cube.net/open_trac/changeset/18742" xml:lang="en">http://svn.ec-cube.net/open_trac/changeset/18742</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.ec-cube.net/info/weakness/weakness.php?id=36" xml:lang="en">http://www.ec-cube.net/info/weakness/weakness.php?id=36</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46100" xml:lang="en">46100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65079" xml:lang="en">ec-cube-list-xss(65079)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in (1) data/Smarty/templates/default/list.tpl and (2) data/Smarty/templates/default/campaign/bloc/cart_tag.tpl in EC-CUBE before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0452">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:3.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:4.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:5.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:lunascape:lunascape:6.4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:lunascape:lunascape:3.0.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.0.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.1.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.5.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.5.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.5.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.5.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.5.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.6.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.6.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.6.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.6.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.6.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:3.6.5</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.5</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.6</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.0.7</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.1.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.1.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.1.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.1.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.2.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.2.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.2.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.3.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.3.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.3.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.3.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.5.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.5.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.5.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.6</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.6.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.6.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.6.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.6.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.6.5</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.7.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.7.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.7.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.7.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.7.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.8.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:4.8.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.0:rc3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.0.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.0.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.0.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.0.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.0.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.0.5</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1:beta</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1.5</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:5.1.6</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.0.0</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.0.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.0.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.0.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1.5</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1.6</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.1.7</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.2.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.3.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.3.2</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.3.3</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.3.4</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.4.1</vuln:product>
      <vuln:product>cpe:/a:lunascape:lunascape:6.4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0452</vuln:cve-id>
    <vuln:published-datetime>2011-02-24T16:00:01.287-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.823-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN38362957/" xml:lang="en">JVN#38362957</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000012.html" xml:lang="en">JVNDB-2011-000012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://lunapedia.lunascape.jp/index.php?title=Lunascape6#2011.2F02.2F18_ver_6.4.3" xml:lang="en">http://lunapedia.lunascape.jp/index.php?title=Lunascape6#2011.2F02.2F18_ver_6.4.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65592" xml:lang="en">lunascape-dll-code-execution(65592)</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in the script function in Lunascape before 6.4.3 allows local users to gain privileges via a Trojan horse executable file in the current working directory.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0453">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:f-secure:internet_gatekeeper:3.02.1221::linux"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:f-secure:internet_gatekeeper:3.02.1221::linux</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0453</vuln:cve-id>
    <vuln:published-datetime>2011-02-18T12:00:46.213-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-10T22:50:43.893-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN71542734/index.html" xml:lang="en">JVN#71542734</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/jvndb/JVNDB-2011-000013" xml:lang="en">JVNDB-2011-000013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html" xml:lang="en">http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2011-1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0393" xml:lang="en">ADV-2011-0393</vuln:reference>
    </vuln:references>
    <vuln:summary>F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0454">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:1.00"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.01"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.20"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.30"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.40"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.41"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.42"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.50"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.51"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.52"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.60"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.61"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.62"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.63"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.70"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.72"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.73"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.74"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:2.75"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:3.01"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:3.02"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:3.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fb1_firmware:3.11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:iij:seil%2fb1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.00"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.20"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.21"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.22"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.30"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.31"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.32"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.40"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.41"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.43"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:1.44"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.20"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.30"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.40"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.41"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.42"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.50"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.51"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.52"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.60"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.61"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.62"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.63"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.70"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.72"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.73"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.74"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:2.75"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:3.01"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:3.02"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:3.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx1_firmware:3.11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:iij:seil%2fx1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.00"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.20"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.21"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.22"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.30"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.31"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.32"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.40"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.41"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.43"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:1.44"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.20"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.30"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.40"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.41"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.42"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.50"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.51"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.52"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.60"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.61"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.62"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.63"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.70"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.72"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.73"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.74"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:2.75"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:3.01"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:3.02"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:3.10"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx2_firmware:3.11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:iij:seil%2fx2"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx86_firmware:1.00"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fx86_firmware:1.61"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:iij:seil%2fx86"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.80"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.81"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.82"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.83"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.84"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.85"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.90"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.91"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.92"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.93"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.94"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.95"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.96"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.98"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:1.99"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.00"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.01"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.02"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.03"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.04"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.05"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.06"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.07"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.08"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.09"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fturbo_firmware:2.10"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:iij:seil%2fturbo"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.80"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.81"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.82"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.83"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.84"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.85"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.90"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.91"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.92"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.93"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.94"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.95"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.96"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.98"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.99"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.00"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.01"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.02"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.03"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.04"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.05"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.06"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.07"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.08"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.09"/>
          <cpe-lang:fact-ref name="cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.10"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:iij:seil%2fneu_2fe_plus"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:1.00</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.01</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.20</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.30</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.40</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.41</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.42</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.50</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.51</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.52</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.60</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.61</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.62</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.63</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.70</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.72</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.73</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.74</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:2.75</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:3.01</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:3.02</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:3.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fb1_firmware:3.11</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.80</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.81</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.82</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.83</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.84</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.85</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.90</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.91</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.92</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.93</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.94</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.95</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.96</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.98</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:1.99</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.00</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.01</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.02</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.03</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.04</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.05</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.06</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.07</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.08</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.09</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fneu_2fe_plus_firmware:2.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.80</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.81</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.82</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.83</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.84</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.85</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.90</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.91</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.92</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.93</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.94</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.95</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.96</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.98</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:1.99</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.00</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.01</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.02</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.03</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.04</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.05</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.06</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.07</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.08</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.09</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fturbo_firmware:2.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.00</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.11</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.20</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.21</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.22</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.30</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.31</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.32</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.40</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.41</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.43</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:1.44</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.20</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.30</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.40</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.41</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.42</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.50</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.51</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.52</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.60</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.61</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.62</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.63</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.70</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.72</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.73</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.74</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:2.75</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:3.01</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:3.02</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:3.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx1_firmware:3.11</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.00</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.11</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.20</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.21</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.22</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.30</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.31</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.32</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.40</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.41</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.43</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:1.44</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.20</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.30</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.40</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.41</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.42</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.50</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.51</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.52</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.60</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.61</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.62</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.63</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.70</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.72</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.73</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.74</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:2.75</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:3.01</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:3.02</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:3.10</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx2_firmware:3.11</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx86_firmware:1.00</vuln:product>
      <vuln:product>cpe:/a:iij:seil%2fx86_firmware:1.61</vuln:product>
      <vuln:product>cpe:/h:iij:seil%2fb1</vuln:product>
      <vuln:product>cpe:/h:iij:seil%2fneu_2fe_plus</vuln:product>
      <vuln:product>cpe:/h:iij:seil%2fturbo</vuln:product>
      <vuln:product>cpe:/h:iij:seil%2fx1</vuln:product>
      <vuln:product>cpe:/h:iij:seil%2fx2</vuln:product>
      <vuln:product>cpe:/h:iij:seil%2fx86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0454</vuln:cve-id>
    <vuln:published-datetime>2011-03-01T18:00:02.800-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.930-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>8.3</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN88991166/index.html" xml:lang="en">JVN#88991166</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014" xml:lang="en">JVNDB-2011-000014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46598" xml:lang="en">46598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.seil.jp/support/security/a01001.html" xml:lang="en">http://www.seil.jp/support/security/a01001.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65672" xml:lang="en">seil-pppac-bo(65672)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0455">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:things_bbs:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:things_bbs:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:things_bbs:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:things_bbs:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:things_bbs:2.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:bbs_thread:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:bbs_thread:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:bbs_thread:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:thingslabo:bbs_thread:2.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:thingslabo:bbs_thread:1.0.0</vuln:product>
      <vuln:product>cpe:/a:thingslabo:bbs_thread:2.0.0</vuln:product>
      <vuln:product>cpe:/a:thingslabo:bbs_thread:2.0.1</vuln:product>
      <vuln:product>cpe:/a:thingslabo:bbs_thread:2.0.2</vuln:product>
      <vuln:product>cpe:/a:thingslabo:things_bbs:1.0.4</vuln:product>
      <vuln:product>cpe:/a:thingslabo:things_bbs:1.1.0</vuln:product>
      <vuln:product>cpe:/a:thingslabo:things_bbs:2.0.0</vuln:product>
      <vuln:product>cpe:/a:thingslabo:things_bbs:2.0.1</vuln:product>
      <vuln:product>cpe:/a:thingslabo:things_bbs:2.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0455</vuln:cve-id>
    <vuln:published-datetime>2011-03-02T20:00:00.833-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:30.993-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN20982938/index.html" xml:lang="en">JVN#20982938</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/jvndb/JVNDB-2011-000015" xml:lang="en">JVNDB-2011-000015</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46638" xml:lang="en">46638</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.thingslabo.com/cgi/bbs/download.html" xml:lang="en">http://www.thingslabo.com/cgi/bbs/download.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.thingslabo.com/cgi/bbs_thread/download.html" xml:lang="en">http://www.thingslabo.com/cgi/bbs_thread/download.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65852" xml:lang="en">bbs-bbsthread-unspecified-xss(65852)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Things BBS before 2.0.3 and BBS Thread before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0456">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:otrs:otrs:2.3.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:otrs:otrs:1.3.2</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:1.3.3</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.0.1</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.0.2</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.0.3</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.0.4</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.0.5</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.1</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.2</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.3</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.4</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.5</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.6</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.7</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.8</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.1.9</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.1</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.2</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.3</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.4</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.5</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.6</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.7</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.8</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.2.9</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.3.1</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.3.2</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.3.3</vuln:product>
      <vuln:product>cpe:/a:otrs:otrs:2.3.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0456</vuln:cve-id>
    <vuln:published-datetime>2011-03-11T12:55:02.667-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-08-26T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-14T09:43:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN73162541/index.html" xml:lang="en">JVN#73162541</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/jvndb/JVNDB-2011-000019" xml:lang="en">JVNDB-2011-000019</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="https://hermes.opensuse.org/messages/7797670" xml:lang="en">openSUSE-SU-2011:0278</vuln:reference>
    </vuln:references>
    <vuln:summary>webscript.pl in Open Ticket Request System (OTRS) 2.3.4 and earlier allows remote attackers to execute arbitrary commands via unspecified vectors, related to a "command injection vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0457">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6_10"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6_11"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6_12"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6_13"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6_14"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6_15"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6_15a"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.7"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.8"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.9"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.10"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.11"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.12"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.13"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.14"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.15"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.16"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.17"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.18"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.19"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.20"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.21"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.7.22"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.545"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.547:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.548:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.549:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.551:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.552:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.553:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.554"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.554:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.555:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.600"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.601"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.602"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.603"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.604"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.605"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.606"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.607"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.608"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.609"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.610"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.611"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.612"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.613"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.614"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.615"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.615a"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.616"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.617"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6171"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6172"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6173"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6174"/>
        <cpe-lang:fact-ref name="cpe:/a:e107:e107:0.6175"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:e107:e107:0.6_10</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6_11</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6_12</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6_13</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6_14</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6_15</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6_15a</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.0</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.1</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.2</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.3</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.4</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.5</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.6</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.7</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.8</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.9</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.10</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.11</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.12</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.13</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.14</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.15</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.16</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.17</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.18</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.19</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.20</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.21</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.7.22</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.545</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.547:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.548:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.549:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.551:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.552:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.553:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.554</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.554:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.555:beta</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.600</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.601</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.602</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.603</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.604</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.605</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.606</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.607</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.608</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.609</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.610</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.611</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.612</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.613</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.614</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.615</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.615a</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.616</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.617</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6171</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6172</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6173</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6174</vuln:product>
      <vuln:product>cpe:/a:e107:e107:0.6175</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0457</vuln:cve-id>
    <vuln:published-datetime>2011-03-15T13:55:03.780-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-15T13:55:03.780-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-03-15T15:11:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://e107.org/comment.php?comment.news.872" xml:lang="en">http://e107.org/comment.php?comment.news.872</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://e107.org/svn_changelog.php?version=0.7.23" xml:lang="en">http://e107.org/svn_changelog.php?version=0.7.23</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN01635457/index.html" xml:lang="en">JVN#01635457</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in e107 0.7.22 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0458">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:picasa:3.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:picasa:3.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0458</vuln:cve-id>
    <vuln:published-datetime>2011-03-28T12:55:04.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:31.057-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN99977321/index.html" xml:lang="en">JVN#99977321</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/jvndb/JVNDB-2011-000022" xml:lang="en">JVNDB-2011-000022</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47031" xml:lang="en">47031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0766" xml:lang="en">ADV-2011-0766</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66295" xml:lang="en">google-picasa-dll-code-execution(66295)</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in the Locate on Disk feature in Google Picasa before 3.8 allows local users to gain privileges via a Trojan horse executable file in the current working directory.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0459">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cyber-ark:password_vault_web_access:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cyber-ark:password_vault_web_access:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cyber-ark:password_vault_web_access:5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cyber-ark:password_vault_web_access:5.5:patch4"/>
        <cpe-lang:fact-ref name="cpe:/a:cyber-ark:password_vault_web_access:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cyber-ark:password_vault_web_access:6.0:patch2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cyber-ark:password_vault_web_access:4.0</vuln:product>
      <vuln:product>cpe:/a:cyber-ark:password_vault_web_access:5.0</vuln:product>
      <vuln:product>cpe:/a:cyber-ark:password_vault_web_access:5.5</vuln:product>
      <vuln:product>cpe:/a:cyber-ark:password_vault_web_access:5.5:patch4</vuln:product>
      <vuln:product>cpe:/a:cyber-ark:password_vault_web_access:6.0</vuln:product>
      <vuln:product>cpe:/a:cyber-ark:password_vault_web_access:6.0:patch2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0459</vuln:cve-id>
    <vuln:published-datetime>2011-10-04T22:56:24.583-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-05-14T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-10-05T10:57:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN11424086/index.html" xml:lang="en">JVN#11424086</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/jvndb/JVNDB-2011-000023" xml:lang="en">JVNDB-2011-000023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47271" xml:lang="en">47271</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Cyber-Ark Password Vault Web Access (PVWA) 5.0 and earlier, 5.5 through 5.5 patch 4, and 6.0 through 6.0 patch 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0460">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:0.99"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.01"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.03"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.04"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.05"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.06"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.08"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:kbd-project:kbd:1.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:kbd-project:kbd:0.99</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.01</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.03</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.04</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.05</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.06</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.08</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.10</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.11</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.12</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.13</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.14</vuln:product>
      <vuln:product>cpe:/a:kbd-project:kbd:1.14.1</vuln:product>
      <vuln:product>cpe:/o:opensuse:opensuse:11.2</vuln:product>
      <vuln:product>cpe:/o:opensuse:opensuse:11.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0460</vuln:cve-id>
    <vuln:published-datetime>2014-04-16T14:37:09.083-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:33.390-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.3</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2014-04-16T14:55:49.183-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-updates/2011-04/msg00053.html" xml:lang="en">openSUSE-SU-2011:0357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/show_bug.cgi?id=663898" xml:lang="en">https://bugzilla.novell.com/show_bug.cgi?id=663898</vuln:reference>
    </vuln:references>
    <vuln:summary>The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0461">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:opensuse:opensuse:11.2</vuln:product>
      <vuln:product>cpe:/o:opensuse:opensuse:11.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0461</vuln:cve-id>
    <vuln:published-datetime>2011-04-04T08:27:36.530-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:33.390-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.3</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" xml:lang="en">SUSE-SR:2011:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-updates/2011-03/msg00007.html" xml:lang="en">[opensuse-updates] 20110314 openSUSE-SU-2011:0171-1 (moderate): aaa_base security update</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.novell.com/security/cve/CVE-2011-0461.html" xml:lang="en">http://support.novell.com/security/cve/CVE-2011-0461.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/665479" xml:lang="en">https://bugzilla.novell.com/665479</vuln:reference>
    </vuln:references>
    <vuln:summary>/etc/init.d/boot.localfs in the aaa_base package before 11.2-43.48.1 in SUSE openSUSE 11.2, and before 11.3-8.7.1 in openSUSE 11.3, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/mtab.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0462">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.7.7"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.9.90"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.9.91"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:1.9.92"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.103"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.104"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.106"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.5.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.5</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.6</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7.2</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7.3</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7.4</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7.5</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7.6</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.7.7</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.8</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.9.90</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.9.91</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:1.9.92</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.1</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.2</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.3</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.4</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.5</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.6</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.7</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.8</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.16</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.103</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.104</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.106</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.1</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.2</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.3</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.4</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.5</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.5.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0462</vuln:cve-id>
    <vuln:published-datetime>2011-04-09T22:51:19.243-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-22T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-04-11T08:37:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://news.opensuse.org/2011/03/02/build-service-team-releases-new-versions-fixing-security-problems/" xml:lang="en">http://news.opensuse.org/2011/03/02/build-service-team-releases-new-versions-fixing-security-problems/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/show_bug.cgi?id=669909" xml:lang="en">https://bugzilla.novell.com/show_bug.cgi?id=669909</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the login page in the webui component in SUSE openSUSE Build Service (OBS) before 2.1.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0463">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.29.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.30.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.31.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.32.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.33.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.34.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.35.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.36.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.37.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.38.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.29.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.30.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.31.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.32.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.33.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.34.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.35.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.36.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.37.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.38.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0463</vuln:cve-id>
    <vuln:published-datetime>2011-04-09T22:51:19.307-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-03-19T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-04-11T08:58:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=272b62c1f0f6f742046e45b50b6fec98860208a0" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=272b62c1f0f6f742046e45b50b6fec98860208a0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://oss.oracle.com/pipermail/ocfs2-devel/2011-February/007846.html" xml:lang="en">[ocfs2-devel] 20110217 [PATCH] Treat writes as new when holes span across page boundaries</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.39-rc1" xml:lang="en">http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.39-rc1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1146-1" xml:lang="en">USN-1146-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/show_bug.cgi?id=673037" xml:lang="en">https://bugzilla.novell.com/show_bug.cgi?id=673037</vuln:reference>
    </vuln:references>
    <vuln:summary>The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by reading a file.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0464">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:vibe_onprem:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:vibe_onprem:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0464</vuln:cve-id>
    <vuln:published-datetime>2011-03-09T18:00:02.107-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:31.103-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1025163" xml:lang="en">1025163</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5088845.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5088845.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46672" xml:lang="en">46672</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0592" xml:lang="en">ADV-2011-0592</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/65865" xml:lang="en">novell-vibeonprem-unspec-code-exec(65865)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Novell Vibe OnPrem 3.0 before Hot Patch 1 allows remote attackers to execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0465">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:matthias_hopf:xrdb:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:matthias_hopf:xrdb:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:matthias_hopf:xrdb:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:matthias_hopf:xrdb:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:matthias_hopf:xrdb:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:matthias_hopf:xrdb:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:matthias_hopf:xrdb:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r1"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r2"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r3"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r4"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r5"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r6.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:x:x11:r7.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:matthias_hopf:xrdb:1.0.2</vuln:product>
      <vuln:product>cpe:/a:matthias_hopf:xrdb:1.0.3</vuln:product>
      <vuln:product>cpe:/a:matthias_hopf:xrdb:1.0.4</vuln:product>
      <vuln:product>cpe:/a:matthias_hopf:xrdb:1.0.5</vuln:product>
      <vuln:product>cpe:/a:matthias_hopf:xrdb:1.0.6</vuln:product>
      <vuln:product>cpe:/a:matthias_hopf:xrdb:1.0.7</vuln:product>
      <vuln:product>cpe:/a:matthias_hopf:xrdb:1.0.8</vuln:product>
      <vuln:product>cpe:/a:x:x11:r1</vuln:product>
      <vuln:product>cpe:/a:x:x11:r2</vuln:product>
      <vuln:product>cpe:/a:x:x11:r3</vuln:product>
      <vuln:product>cpe:/a:x:x11:r4</vuln:product>
      <vuln:product>cpe:/a:x:x11:r5</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.1</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.3</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.4</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.5.1</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.6</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.7</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.7.0</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.8.0</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.8.1</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.8.2</vuln:product>
      <vuln:product>cpe:/a:x:x11:r6.9.0</vuln:product>
      <vuln:product>cpe:/a:x:x11:r7.0</vuln:product>
      <vuln:product>cpe:/a:x:x11:r7.1</vuln:product>
      <vuln:product>cpe:/a:x:x11:r7.2</vuln:product>
      <vuln:product>cpe:/a:x:x11:r7.3</vuln:product>
      <vuln:product>cpe:/a:x:x11:r7.4</vuln:product>
      <vuln:product>cpe:/a:x:x11:r7.5</vuln:product>
      <vuln:product>cpe:/a:x:x11:r7.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0465</vuln:cve-id>
    <vuln:published-datetime>2011-04-08T11:17:25.697-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:33:31.180-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56" xml:lang="en">http://cgit.freedesktop.org/xorg/app/xrdb/commit/?id=1027d5df07398c1507fb1fe3a9981aa6b4bc3a56</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057928.html" xml:lang="en">FEDORA-2011-4871</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.freedesktop.org/archives/xorg-announce/2011-April/001635.html" xml:lang="en">[xorg-announce] 20110405 xrdb 1.0.9</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.freedesktop.org/archives/xorg-announce/2011-April/001636.html" xml:lang="en">[xorg-announce] 20110405 X.Org security advisory: root hole via rogue hostname</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html" xml:lang="en">SUSE-SA:2011:016</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2011&amp;m=slackware-security.465748" xml:lang="en">SSA:2011-096-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2213" xml:lang="en">DSA-2213</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:076" xml:lang="en">MDVSA-2011:076</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0432.html" xml:lang="en">RHSA-2011:0432</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0433.html" xml:lang="en">RHSA-2011:0433</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47189" xml:lang="en">47189</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025317" xml:lang="en">1025317</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1107-1" xml:lang="en">USN-1107-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0880" xml:lang="en">ADV-2011-0880</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0889" xml:lang="en">ADV-2011-0889</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0906" xml:lang="en">ADV-2011-0906</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0929" xml:lang="en">ADV-2011-0929</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0966" xml:lang="en">ADV-2011-0966</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0975" xml:lang="en">ADV-2011-0975</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=680196" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=680196</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66585" xml:lang="en">xorg11-xrdb-command-execution(66585)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="https://lwn.net/Articles/437150/" xml:lang="en">openSUSE-SU-2011:0298</vuln:reference>
    </vuln:references>
    <vuln:summary>xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0466">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.103"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.104"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.0.106"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:opensuse_build_service:2.1.5.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.1</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.2</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.3</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.4</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.5</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.6</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.7</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.16</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.103</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.104</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.0.106</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.0</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.1</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.2</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.3</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.4</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.5</vuln:product>
      <vuln:product>cpe:/a:novell:opensuse_build_service:2.1.5.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0466</vuln:cve-id>
    <vuln:published-datetime>2011-04-09T22:51:19.383-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-04-21T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2011-04-11T09:08:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://news.opensuse.org/2011/03/02/build-service-team-releases-new-versions-fixing-security-problems/" xml:lang="en">http://news.opensuse.org/2011/03/02/build-service-team-releases-new-versions-fixing-security-problems/</vuln:reference>
    </vuln:references>
    <vuln:summary>The API in SUSE openSUSE Build Service (OBS) 2.0.x before 2.0.8 and 2.1.x before 2.1.6 allows attackers to bypass intended write-access restrictions and modify a (1) package or (2) project via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0467">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false"/>
    </vuln:vulnerable-configuration>
    <vuln:cve-id>CVE-2011-0467</vuln:cve-id>
    <vuln:published-datetime>2018-06-07T17:29:00.260-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-10-09T19:02:21.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.suse.com/show_bug.cgi?id=675039" xml:lang="en">https://bugzilla.suse.com/show_bug.cgi?id=675039</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://www.suse.com/security/cve/CVE-2011-0467/" xml:lang="en">https://www.suse.com/security/cve/CVE-2011-0467/</vuln:reference>
    </vuln:references>
    <vuln:summary>A vulnerability in the listing of available software of SUSE SUSE Studio Onsite, SUSE Studio Onsite 1.1 Appliance allows authenticated users to execute arbitrary SQL statements via SQL injection. Affected releases are SUSE SUSE Studio Onsite: versions prior to 1.0.3-0.18.1, SUSE Studio Onsite 1.1 Appliance: versions prior to 1.1.2-0.25.1.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0468">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:opensuse:opensuse:11.3</vuln:product>
      <vuln:product>cpe:/o:opensuse:opensuse:11.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0468</vuln:cve-id>
    <vuln:published-datetime>2011-04-04T08:27:36.577-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:33.420-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" xml:lang="en">SUSE-SR:2011:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-updates/2011-03/msg00010.html" xml:lang="en">[opensuse-updates] 20110322 openSUSE-SU-2011:0207-1 (moderate): aaa_base security update</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.novell.com/security/cve/CVE-2011-0468.html" xml:lang="en">http://support.novell.com/security/cve/CVE-2011-0468.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/46983" xml:lang="en">46983</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/678827" xml:lang="en">https://bugzilla.novell.com/678827</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66245" xml:lang="en">aaabase-filename-privilege-escalation(66245)</vuln:reference>
    </vuln:references>
    <vuln:summary>The aaa_base package before 11.3-8.9.1 in SUSE openSUSE 11.3, and before 11.4-54.62.1 in openSUSE 11.4, allows local users to gain privileges via shell metacharacters in a filename, related to tab expansion.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0469">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:suse:opensuse:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:suse:opensuse:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0469</vuln:cve-id>
    <vuln:published-datetime>2017-08-17T12:29:00.190-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-25T11:11:53.807-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2017-08-25T08:41:51.740-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.suse.com/show_bug.cgi?id=679325" xml:lang="en">https://bugzilla.suse.com/show_bug.cgi?id=679325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://github.com/openSUSE/open-build-service/commit/23c8d21c75242999e29379e6ca8418a14c8725c6" xml:lang="en">https://github.com/openSUSE/open-build-service/commit/23c8d21c75242999e29379e6ca8418a14c8725c6</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://github.com/openSUSE/open-build-service/commit/76b0ab003f34435ca90d943e02dd22279cdeec2a" xml:lang="en">https://github.com/openSUSE/open-build-service/commit/76b0ab003f34435ca90d943e02dd22279cdeec2a</vuln:reference>
    </vuln:references>
    <vuln:summary>Code injection in openSUSE when running some source services used in the open build service 2.1 before March 11 2011.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0470">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0470</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.607-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:00.287-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14366" name="oval:org.mitre.oval:def:14366"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=58053" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=58053</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64661" xml:lang="en">unspecified(64661)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle extensions notification, which allows remote attackers to cause a denial of service (application crash) via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0471">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0471</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.653-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:00.473-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13710" name="oval:org.mitre.oval:def:13710"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=65764" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=65764</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64662" xml:lang="en">chrome-iteration-unspecified(64662)</vuln:reference>
    </vuln:references>
    <vuln:summary>The node-iteration implementation in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 does not properly handle pointers, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0472">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0472</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.700-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:00.660-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14622" name="oval:org.mitre.oval:def:14622"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=66334" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=66334</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64663" xml:lang="en">chrome-pdf-files-unspecified(64663)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle the printing of PDF documents, which allows user-assisted remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a multi-page document.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0473">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0473</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.747-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:00.863-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14460" name="oval:org.mitre.oval:def:14460"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=66560" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=66560</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64664" xml:lang="en">chrome-css-canvas-unspecified(64664)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle Cascading Style Sheets (CSS) token sequences in conjunction with CANVAS elements, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0474">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:debian:debian_linux:6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:debian:debian_linux:7.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:debian:debian_linux:6.0</vuln:product>
      <vuln:product>cpe:/o:debian:debian_linux:7.0</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0474</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.810-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:01.067-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14443" name="oval:org.mitre.oval:def:14443"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=66748" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=66748</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2188" xml:lang="en">DSA-2188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64665" xml:lang="en">chrome-css-cursors-unspecified(64665)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle Cascading Style Sheets (CSS) token sequences in conjunction with cursors, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0475">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0475</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.843-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:01.253-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14606" name="oval:org.mitre.oval:def:14606"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=67100" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=67100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64666" xml:lang="en">chrome-pdf-pages-code-execution(64666)</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a PDF document.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0476">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0476</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.903-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:01.443-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14102" name="oval:org.mitre.oval:def:14102"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=67208" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=67208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64667" xml:lang="en">chrome-pdf-files-ce(64667)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 allow remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a PDF document that triggers an out-of-memory error.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0477">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0477</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:01.770-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14390" name="oval:org.mitre.oval:def:14390"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=67303" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=67303</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64668" xml:lang="en">chrome-video-frame-code-execution(64668)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle a mismatch in video frame sizes, which allows remote attackers to cause a denial of service (incorrect memory access) or possibly have unspecified other impact via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0478">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0478</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:02.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:01.943-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14191" name="oval:org.mitre.oval:def:14191"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=67363" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=67363</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64669" xml:lang="en">chrome-use-code-execution(64669)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly handle SVG use elements, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer."</vuln:summary>
  </entry>
  <entry id="CVE-2011-0479">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0479</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:03.013-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:02.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14746" name="oval:org.mitre.oval:def:14746"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=67393" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=67393</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64670" xml:lang="en">chrome-rouge-code-execution(64670)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly interact with extensions, which allows remote attackers to cause a denial of service via a crafted extension that triggers an uninitialized pointer.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0480">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.292.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.294.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.295.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.296.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.299.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.300.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.301.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.302.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.303.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.304.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.305.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1001</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1004</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1006</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1007</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1008</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1009</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1010</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1011</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1012</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1013</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1014</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1015</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1016</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1017</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1018</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1019</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1020</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1021</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1022</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1023</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1024</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1025</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1026</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1027</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1028</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1029</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1030</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1031</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1032</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1033</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1034</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1035</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1036</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1037</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1038</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1039</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1040</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1041</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1042</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1043</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1044</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1045</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1046</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1047</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1048</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1049</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1050</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1051</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1052</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1053</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1054</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1055</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1056</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1057</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1058</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1059</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1060</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1061</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1062</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1063</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.1.249.1064</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.306.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.307.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.308.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.309.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.313.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.314.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.315.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.316.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.317.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.318.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.319.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.320.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.321.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.322.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.323.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.324.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.325.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.326.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.327.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.328.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.329.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.330.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.332.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.333.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.334.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.335.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.336.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.337.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.338.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.339.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.340.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.341.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.342.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.343.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.344.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.345.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.346.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.347.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.348.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.349.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.350.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.351.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.353.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.354.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.355.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.356.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.357.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.358.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.359.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.360.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.361.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.362.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.363.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.364.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.365.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.366.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.367.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.368.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.369.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.370.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.371.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.372.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.373.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.374.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.83</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.84</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.85</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.86</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.87</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.88</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.90</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.91</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.92</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.93</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.94</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.95</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.96</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.97</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.98</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.99</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.125</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.126</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.375.127</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.376.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.378.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.379.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.380.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.381.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.382.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.383.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.384.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.385.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.386.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.387.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.390.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.391.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.392.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.393.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.394.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.395.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:5.0.396.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.397.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.398.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.399.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.400.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.401.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.403.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.404.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.405.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.406.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.407.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.408.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.409.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.410.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.411.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.412.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.413.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.414.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.415.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.416.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.417.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.418.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.419.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.421.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.422.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.423.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.424.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.425.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.426.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.427.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.428.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.430.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.431.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.432.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.433.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.434.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.435.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.436.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.437.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.438.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.440.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.441.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.443.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.444.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.445.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.446.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.447.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.449.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.450.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.451.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.452.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.453.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.454.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.455.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.456.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.457.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.458.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.459.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.460.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.461.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.462.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.464.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.465.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.466.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.467.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.469.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.470.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.471.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.472.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.473.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.474.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.475.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.476.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.477.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.478.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.479.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.480.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.481.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.482.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.483.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.484.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.485.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.486.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.487.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.488.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.489.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.490.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.491.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.492.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.493.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.494.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.495.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:6.0.496.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.497.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.498.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.499.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.500.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.503.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.504.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.505.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.506.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.507.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.509.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.510.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.511.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.512.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.513.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.514.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.515.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.516.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.517.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.518.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.519.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.520.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.521.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.522.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.524.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.525.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.526.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.528.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.529.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.530.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.531.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.535.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.536.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.537.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.538.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.539.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.540.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.541.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.542.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.544.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.547.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:7.0.548.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.549.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.550.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.551.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.13</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.15</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.100</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.101</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.102</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.103</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.104</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.105</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.200</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.201</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.202</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.203</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.204</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.205</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.206</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.207</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.208</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.209</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.210</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.211</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.212</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.213</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.214</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.215</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.216</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.217</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.219</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.220</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.221</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.223</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.224</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.225</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.226</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.227</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.228</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.229</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.230</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.231</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.232</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.233</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.234</vuln:product>
      <vuln:product>cpe:/a:google:chrome:8.0.552.235</vuln:product>
      <vuln:product>cpe:/o:google:chrome_os:8.0.552.343</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2011-0480</vuln:cve-id>
    <vuln:published-datetime>2011-01-14T12:00:03.060-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-18T21:32:02.333-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14380" name="oval:org.mitre.oval:def:14380"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://article.gmane.org/gmane.comp.video.ffmpeg.devel/122703" xml:lang="en">[ffmpeg-devel] 20101229 [PATCH] Fix a couple of errors with bad Vorbis headers</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610550" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610550</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/chromium/issues/detail?id=68115" xml:lang="en">http://code.google.com/p/chromium/issues/detail?id=68115</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://codereview.chromium.org/5964011" xml:lang="en">http://codereview.chromium.org/5964011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://codereview.chromium.org/6069005" xml:lang="en">http://codereview.chromium.org/6069005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ffmpeg.mplayerhq.hu/" xml:lang="en">http://ffmpeg.mplayerhq.hu/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.ffmpeg.org/?p=ffmpeg.git;a=commit;h=13184036a6b1b1d4b61c91118c0896e9ad4634c3" xml:lang="en">http://git.ffmpeg.org/?p=ffmpeg.git;a=commit;h=13184036a6b1b1d4b61c91118c0896e9ad4634c3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html" xml:lang="en">http://googlechromereleases.blogspot.com/2011/01/chrome-stable-release.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://roundup.ffmpeg.org/issue2548" xml:lang="en">http://roundup.ffmpeg.org/issue2548</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://roundup.ffmpeg.org/issue2550" xml:lang="en">http://roundup.ffmpeg.org/issue2550</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://src.chromium.org/viewvc/chrome?view=rev&amp;revision=70200" xml:lang="en">http://src.chromium.org/viewvc/chrome?view=rev&amp;revision=70200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2306" xml:lang="en">DSA-2306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:061" xml:lang="en">MDVSA-2011:061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/45788" xml:lang="en">45788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054" xml:lang="en">http://www.srware.net/forum/viewtopic.php?f=18&amp;t=2054</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-1104-1/" xml:lang="en">USN-1104-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/64671" xml:lang="en">chrome-vorbis-bo(64671)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in vorbis_dec.c in the Vorbis decoder in FFmpeg, as used in Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted WebM file, related to buffers for (1) the channel floor and (2) the channel residue.</vuln:summary>
  </entry>
  <entry id="CVE-2011-0481">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:google:chrome_os:8.0.552.343"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.38.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.40.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.1.42.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.149.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.156.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.157.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.158.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.159.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.169.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.170.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:2.0.172.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.182.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.190.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.193.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:3.0.195.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.212.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.221.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.222.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.223.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.224.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.229.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.235.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.236.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.237.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.239.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.240.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.241.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.242.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.243.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.244.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.245.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.246.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.247.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.248.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.78:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.249.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.250.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.251.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.252.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.254.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.255.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.256.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.257.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.258.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.259.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.260.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.261.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.262.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.263.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.264.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.265.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.266.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.267.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.268.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.269.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.271.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.272.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.275.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.276.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.277.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.278.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.286.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.287.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.288.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.289.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.290.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.292.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.294.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.295.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.296.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.299.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.300.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.301.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.302.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.303.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.304.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.0.305.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1001"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1004"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1006"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1007"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1008"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1009"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1010"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1011"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1012"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1013"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1014"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1015"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1016"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1017"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1018"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1019"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1020"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1021"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1022"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1023"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1024"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1025"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1026"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1027"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1028"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1029"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1030"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1031"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1032"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1033"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1034"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1035"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1036"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1037"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1038"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1039"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1040"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1041"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1042"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1043"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1044"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1045"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1046"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1047"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1048"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1049"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1050"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1051"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1052"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1053"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1054"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1055"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1056"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1057"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1058"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1059"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1060"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1061"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1062"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1063"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:4.1.249.1064"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.306.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.307.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.308.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.309.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.313.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.314.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.315.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.316.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.317.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.318.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.319.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.320.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.321.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.322.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.323.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.324.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.325.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.326.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.327.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.328.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.329.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.330.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.332.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.333.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.334.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.335.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.336.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.337.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.338.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.339.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.340.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.341.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.342.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.343.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.344.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.345.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.346.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.347.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.348.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.349.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.350.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.351.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.353.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.354.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.355.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.356.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.357.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.358.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.359.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.360.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.361.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.362.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.363.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.364.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.365.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.366.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.367.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.368.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.369.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.370.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.371.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.372.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.373.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.374.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.64"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.65"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.66"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.67"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.68"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.69"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.70"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.71"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.72"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.73"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.74"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.75"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.76"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.77"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.78"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.79"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.80"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.81"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.82"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.83"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.84"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.85"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.86"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.87"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.88"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.89"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.90"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.91"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.92"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.93"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.94"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.95"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.96"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.97"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.98"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.99"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.125"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.126"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.375.127"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.376.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.378.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.379.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.380.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.381.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.382.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.383.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.384.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.385.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.386.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.387.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.390.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.391.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.392.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.393.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.394.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.395.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:5.0.396.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.397.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.398.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.399.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.400.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.401.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.403.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.404.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.405.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.406.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.407.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.408.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.409.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.410.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.411.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.412.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.413.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.414.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.415.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.416.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.417.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.418.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.419.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.421.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.422.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.423.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.424.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.425.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.426.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.427.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.428.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.430.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.431.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.432.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.433.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.434.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.435.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.436.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.437.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.438.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.440.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.441.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.443.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.444.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.445.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.446.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.447.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.449.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.450.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.451.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.452.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.453.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.454.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.455.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.456.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.457.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.458.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.459.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.460.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.461.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.462.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.464.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.465.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.466.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.467.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.469.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.470.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.471.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.45"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.46"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.47"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.48"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.49"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.50"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.51"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.52"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.53"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.54"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.55"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.56"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.57"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.58"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.59"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.60"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.61"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.62"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.472.63"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.473.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.474.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.475.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.476.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.477.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.478.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.479.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.480.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.481.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.482.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.483.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.484.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.485.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.486.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.487.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.488.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.489.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.490.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.491.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.492.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.493.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.494.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.495.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:6.0.496.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.497.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.498.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.499.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.500.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.503.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.504.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.505.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.506.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.507.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.509.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.510.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.511.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.512.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.513.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.514.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.515.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.516.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.5"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.6"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.7"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.8"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.9"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.24"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.25"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.26"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.27"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.28"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.29"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.30"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.32"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.34"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.35"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.37"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.38"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.40"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.41"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.43"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.517.44"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.518.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.519.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.520.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.521.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.522.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.524.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.525.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.526.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.528.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.529.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.530.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.531.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.535.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.536.4"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.537.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.538.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.539.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.540.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.541.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.542.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.544.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.547.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:7.0.548.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.549.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.550.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.551.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.2"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.10"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.11"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.12"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.13"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.14"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.15"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.16"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.17"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.19"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.20"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.21"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.23"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.100"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.101"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.102"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.103"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.104"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.105"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.200"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.201"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.202"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.203"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.204"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.205"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.206"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.207"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.208"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.209"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.210"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.211"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.212"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.213"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.214"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.215"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.216"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.217"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.219"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.220"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.221"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.223"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.224"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.225"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.226"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.227"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.228"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.229"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.230"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.231"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.232"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.233"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.234"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:8.0.552.235"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.1.38.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.38.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.40.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.1.42.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.149.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.156.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.157.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.158.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.159.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.169.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.170.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:2.0.172.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.182.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.190.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.193.2:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:3.0.195.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.212.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.221.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.222.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.223.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.224.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.229.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.235.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.236.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.237.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.239.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.240.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.241.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.242.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.243.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.244.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.245.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.246.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.247.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.248.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.4</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.5</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.6</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.7</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.8</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.9</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.10</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.11</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.12</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.14</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.16</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.17</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.19</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.20</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.21</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.23</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.24</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.25</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.26</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.27</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.28</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.29</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.30</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.32</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.34</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.35</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.37</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.38</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.40</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.41</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.43</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.44</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.45</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.46</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.47</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.48</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.49</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.50</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.51</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.52</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.53</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.54</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.55</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.56</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.57</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.58</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.59</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.60</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.61</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.62</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.63</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.64</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.65</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.66</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.67</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.68</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.69</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.70</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.71</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.72</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.73</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.74</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.75</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.76</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.77</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.78:beta</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.79</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.80</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.81</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.82</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.249.89</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.250.2</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.251.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.252.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.254.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.255.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.256.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.257.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.258.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.259.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.260.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.261.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.262.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.263.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.264.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.265.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.266.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.267.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.268.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.269.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.271.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.272.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.275.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.276.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.277.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.278.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.286.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.287.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.288.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.289.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:4.0.290.0</vuln:product>
      <vuln:product>cpe:/