Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2008-4609
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T10:24:20.677Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { name: "HPSBMI02473", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { name: "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { name: "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { name: "TA09-251A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { name: "20081017 Cisco Response to Outpost24 TCP State Table Manipulation Denial of Service Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { name: "MS09-048", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { name: "oval:org.mitre.oval:def:6340", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { name: "MDVSA-2013:150", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { name: "SSRT080138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-10-02T00:00:00", descriptions: [ { lang: "en", value: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-12T19:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { name: "HPSBMI02473", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { name: "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { tags: [ "x_refsource_MISC", ], url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { name: "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { name: "TA09-251A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { name: "20081017 Cisco Response to Outpost24 TCP State Table Manipulation Denial of Service Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { name: "MS09-048", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { tags: [ "x_refsource_MISC", ], url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { name: "oval:org.mitre.oval:def:6340", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { name: "MDVSA-2013:150", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { name: "SSRT080138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-4609", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", refsource: "MISC", url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { name: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", refsource: "MISC", url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { name: "HPSBMI02473", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { name: "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation", refsource: "MLIST", url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { name: "http://insecure.org/stf/tcp-dos-attack-explained.html", refsource: "MISC", url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { name: "http://www.outpost24.com/news/news-2008-10-02.html", refsource: "MISC", url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { name: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", refsource: "MISC", url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { name: "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products", refsource: "CISCO", url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { name: "TA09-251A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { name: "20081017 Cisco Response to Outpost24 TCP State Table Manipulation Denial of Service Vulnerabilities", refsource: "CISCO", url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { name: "MS09-048", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { name: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", refsource: "MISC", url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { name: "oval:org.mitre.oval:def:6340", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { name: "MDVSA-2013:150", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { name: "SSRT080138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-4609", datePublished: "2008-10-20T17:00:00", dateReserved: "2008-10-20T00:00:00", dateUpdated: "2024-08-07T10:24:20.677Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2008-4609\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-10-20T17:59:26.163\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.\"},{\"lang\":\"es\",\"value\":\"La implementación del protocolo TCP en (1) Linux, (2) plataformas basadas en BSD Unix, (3) Microsoft Windows, (4) productos Cisco, y probablemente otros sistemas operativos, permite a atacantes remotos provocar una denegación de servicio (agotamiento de cola de conexión) a través de múltiples vectores que manipulan información en la tabla de estados del TCP, como lo demuestra sockstress.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":7.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-16\"},{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsd:bsd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAD1A8C6-A3A4-47A6-B8B0-6CB6787C5B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsd:bsd:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1119D3-A2B4-45C2-8EC1-F28EB948CDC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E0E862-63E6-42DA-8CCC-AAAC581FE211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"388BB5C2-53B3-4597-913C-7D86E585CCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C37EB61-50BE-451A-916B-B05BAC79962B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2466F147-1EEC-442F-8066-EF7C65D17F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F5E922C-239D-4F98-87ED-BB7998BE99C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD254562-D74A-4D7C-B846-E242D785B830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBFBCFEE-C24C-4D38-83F9-810E05D27901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766851E2-134A-4A89-931B-6F1753525684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99235B00-0050-42BF-99EF-FCDD72D8627D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950CE88E-E396-4D32-AC9D-B76EB2B537C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F185FD65-A2A8-4170-8419-E939450055B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ECF99E9-1C3B-4D8F-A52E-28D0BFEB2E9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A37687D5-1239-474B-994C-C638AB9B105B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0D6DE57-1B0D-4F40-9E9F-CB72BAC0201F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:bsdi:bsd_os:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7267B83B-1DC7-4A38-9338-B3BC3B2ECD74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6230A85-30D2-4934-A8A0-11499B7B09F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96C6FB91-22FC-4DA9-B19A-8065D8B89F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CF972E-A755-4FB7-BFD7-9F4CDDEA4F1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B4FC3E9-E88E-4C87-ADA4-AC9370BBFD32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72B3032-154D-45C2-8380-CCB28E4F2E8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87395248-5E9C-4257-9CC7-2E2805B69F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A476BFB0-E587-41A6-B691-2609E0146C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E9A00D5-A594-4C64-B982-10CB4C554F51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327028C0-D9F3-46A3-B2CC-4630FE18C43E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79528F96-FD42-4A76-82EE-4B1324D53B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3824A6CC-5C3A-4146-9CDD-B7B213527552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.3\\\\(3.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9FE0721-5166-4756-B620-9C2DFCB252A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.3\\\\(3.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"630947E3-6D04-4A99-AAB3-B988BD513885\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.3\\\\(4.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"850D8A04-E853-4570-A81D-EC053C47BB4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.3\\\\(4.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67D70854-1DEC-43FF-ABA6-85009A253874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.3\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48379D9-1189-4176-A48E-A6ED9B3F91BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.3\\\\(19a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A60756F-CF53-4E57-B313-EC6B9E160B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155F8A0D-EE85-4FB9-97FB-E410A9374310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D626B494-6210-4F74-8D17-BA480B6665C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F4E6F1-8624-4672-A4F3-EC79E49E6D40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E41CBC97-0C46-4717-A525-3A674F07C122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(17\\\\)bt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"275BF994-A447-4C58-855C-E0C21D114B2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4742B4D8-971B-450F-916C-C83FAB808BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(20.3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AFAF8F-B8E2-453B-895C-F94138720745\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(22a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D8524C5-FBC3-4A2F-96D0-15CC43287DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(22b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53F3AD1F-6213-42A7-9C93-EA42C3F4288E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0\\\\(x\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180E123C-BC2B-4CD0-B772-46253E46B93D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.0.12\\\\(a\\\\)bt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"321EEFCA-4DDE-4F37-9F55-55B9500CC104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B6315D-7BEF-419F-9B93-3CF669E986D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19F493EC-885B-4EA6-B1F3-CA5777B67D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AE747C-2507-46FE-B3F8-3C1E6F50353D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(7\\\\)aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B85BFC6-7053-4456-B52A-45F36F285F33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(7\\\\)ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D996F0BC-80EF-45BD-BA24-6F2E22C67D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(9\\\\)ia:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E95809-C581-4D40-8237-AD74742EBB75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC86CED5-1421-40A9-9573-B87EDA6E462E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"328D5C81-27AC-41B9-81FE-7666CE9085B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36FF40E-EF0A-4149-A35D-8D765EBFFAE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(13\\\\)aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51382DA5-4EBC-44DC-951F-32FC7AA719A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(13\\\\)ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BA2A1FD-11A3-403A-B5A6-0220CA18EC99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(13\\\\)ia:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3493F361-0C8A-4B66-AF6B-926E2D66BBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F7375C1-F60A-4793-8C09-70C950F36F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(15\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9CBC6C-9824-486C-B8E2-76DF3EC2A5C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(15\\\\)aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB42AFD1-7FEE-45D4-8CF4-58EF43AB7C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(15\\\\)ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"841513AE-7521-4670-8438-AE5EB70F3A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(15\\\\)ia:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14BDD1FC-F0DF-443B-A498-CDD3A51F146E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3E8F79-6177-453C-99B5-BC9BC7670869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(16\\\\)aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B244655-A6A5-40D0-A0D1-34C814DA9389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(16\\\\)ia:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA064273-1A6E-4303-BAAB-F585691EF9BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672742B0-7D4B-4B2E-96C2-0C74D9A5400A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(17\\\\)cc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A8158E2-0DFE-479B-B085-9775FF700C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(17\\\\)ct:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CA3070-B75D-4E56-A338-E10F5509394E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF085D4E-D2EB-46FA-A426-FC53EB7F5FFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(20\\\\)aa4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36721A7-B29F-4C43-B77B-7C8BB9B8DF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(22\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2AA82A6-B7B8-4B3A-8E6A-968C24EE0FDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(24\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81640A61-B4E4-4209-A9AB-726C15522037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(24a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A53348EA-99B2-4091-9112-B3428E019597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(24b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6022E5C8-34BD-45C4-8FD0-7898902B01A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(24c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9408971-2732-4CBF-A94E-8A1778DFEBCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(28a\\\\)ct:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1795C25-47DD-48E2-B1DE-FD080C497B40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(28a\\\\)ia:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FDC895C-803F-4B04-BBC8-3571C7ECCC8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(36\\\\)ca2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2ED206F-850A-4AEE-87DA-CC2688BC1173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(36\\\\)ca4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B084A3-9F94-4F4C-8622-2D56BB2B3593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(36\\\\)cc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF849813-7A2B-4EB2-8A93-2693636D4E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1\\\\(36\\\\)cc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C43AE16-7B01-4BE1-857D-CFE8AB504FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2842913-FEFF-4443-809B-F1793DDD08AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"478D7C73-4039-4352-ADFF-55623B011C82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F31EAA-F76F-4182-B90D-6997E52EEB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1ct:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D419BED-A8C0-4304-A0E9-7805CE3E7FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1ia:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD4EA445-2947-4754-81BF-2046DFD4DE2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8026B11-6144-467F-8094-F4F73CD37526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550EBE5B-3136-4D67-B2AF-869DE111A821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(4\\\\)f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D1D2A78-BCE8-4E8A-B7DE-36A64B81820C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(4\\\\)f1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17DE2319-19D9-4C02-80B4-0A6AAD853867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(4\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CB0E1F3-CF25-4FD6-B33F-8C9FD660D8B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(4\\\\)xaf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E42FA2-0827-4FCC-98F2-A5C0F79C7016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BFEABB-6E90-4A24-BBE3-2BDB524028A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(8\\\\)p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F169E322-3D72-4F86-BD5F-74589E5DD823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(8\\\\)sa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA5D334-6DB8-44B0-92EF-8694BBE79A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(8\\\\)sa3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"099CFED1-0E2F-46B2-8136-BFA146EB9A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(8\\\\)sa5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754F06BF-EB7D-4DAD-BF5D-7DF2619A7499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(8.2\\\\)sa6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97C1243-BBEB-44AC-96E1-AC46F946EA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(8.9\\\\)sa6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22CD9785-D78E-408F-A3A0-3974DFF3DE78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(9\\\\)p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"047F9781-38B8-488C-B999-A3CA6BDB639C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(9\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3586C0-64AF-4584-8F56-7E0756B4A521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B784C9F-79EE-4D08-9D03-985EC7E378FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(10\\\\)bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFBA8825-442E-4CAD-A9B2-4DD8546F35F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5947E00E-68E7-4E8C-99C5-D69CA67CFCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(11b\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"394E271B-557A-496C-813E-E067D0188136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(14\\\\)gs2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0023E04A-6244-4221-AE19-616265074BDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(15\\\\)g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C4A8A9-A17E-48A1-99EC-A9F87CE17318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(15a\\\\)p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1928C83-1379-4D6C-A7C0-FC7326E558C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(15b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0485E527-0305-4C64-805B-6AD5E611EE50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68C31722-3157-41D6-AABF-B9B18247CE6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(16\\\\)p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F33246EE-340C-4D61-B5D1-780A0785B9D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F106D24F-7EDD-4A52-9A3A-F25E6EEC1870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED418AF9-FCC1-4BFC-8526-AA1BBD5F8E8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(19\\\\)gs0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDF4A90A-8F19-48C6-A340-0CF7701D4F0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(19a\\\\)gs6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD5681AC-1FF2-4CC9-959B-5B56E66AB1C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(23a\\\\)bc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82DE2BBD-70F5-42D6-AC32-A2AE2CF21789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(26\\\\)p2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C7B8494-A9C5-4ACD-B345-9650DE3E1003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(26\\\\)p5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C30199A-2150-45A3-867C-AAAAEFECEED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(26a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EDF0979-4462-4715-A4A0-77DC3273CF22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(26b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA28477F-5F6A-4627-B521-248A4533E7C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2\\\\(26e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF5B2CA-33BC-4D82-97E9-19378EF7AE4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB5BBB7A-3154-4B90-BFC9-17D788387002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64999EDC-0E53-4736-BA6E-219ADE6E75B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2gs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95ACBC17-10FA-449C-B418-F705E9A81363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC1411B-4E7E-4F57-B025-9FE27B09C7AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2sa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA95673E-1686-48D7-8FE9-99D8FAB47FCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2wa3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36548158-EA5E-4638-9309-532B1CCD20A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2wa4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29122FF8-92A4-4072-8B8F-2F9AC79BA4A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.2xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"583E7622-18CB-4C58-B714-F14CB12D1491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6F8329-15C7-4FED-A61D-5AF4F3A33976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(1\\\\)ed:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD13732A-DAE0-4D5B-9DAC-6D2CF391220D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A53DE80A-5865-4514-BE14-BA5992EE7BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(2\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89347FD1-1C65-4947-8AA6-CCCB0F42AC28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(7\\\\)db1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7CB1B7D-F47E-488D-A4BB-5DABB2406673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(8\\\\)db2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C03D666A-4FFD-4486-B8ED-183FC10821E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(8\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8811993-BEBB-448C-A23A-EDF1344AC076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(11\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7C99C7-ABF5-4581-B3CB-A8B2DCD7A5CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(11b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40EEA20D-C974-418D-90AD-2C7099BA76E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(11b\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"918ED671-E08D-4DA6-9FDB-E0878C759F1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(11c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0DE733B-BDBC-49B0-B63C-4DC291DF99B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3\\\\(11d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C353926-CFF7-4B84-84FE-0D1B3CFB2057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8783C0A-990A-4B79-8BF9-64E425DA585E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B3630E-6ED6-4A8F-8FBC-AA68E81490F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046D8679-38F8-4DC9-82A7-2562DE0495F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92509012-2DA2-4045-9AE4-4D8681F64D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C993003-8B99-4CFF-8546-888E8C5D8FEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80AEA6F5-907D-493F-AB07-971D13BC1CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"655BB9C1-BA90-452E-A9C8-9B1E15B99650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3wa4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3267A4-3654-4C7A-966F-9F26B132A065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A747DB2-A031-470F-8EA5-F37FBE175D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F86F790-6247-42F2-9487-3D60A2842F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CFBBDA3-8A5E-407D-8608-45C1BD56BF58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14EBDCA-7CEB-4394-95EF-D4AEE991E2DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(1\\\\)st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F006CA61-42CD-4928-A445-E54B968553C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(1\\\\)w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(1\\\\)xa3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE210B04-7ECD-419C-9258-0F619A353A8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(1\\\\)xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B467741-B277-4128-9804-E13ED23FD310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(1\\\\)xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7EE856-9CE7-49FD-8ADC-05C580CD54A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77DDC99D-8B73-452C-94A7-A9A48F2F379B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2\\\\)xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5145C737-2D5E-4BD4-BA9F-66ED2887A4DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2\\\\)xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C48466C4-5A1E-4C71-8822-32D387B36B8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2\\\\)xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12551307-4D72-4D24-BA0D-07235EB762AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2\\\\)xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E23131-D207-4D98-96D5-2B71FF792604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2\\\\)xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E32C808-0471-443D-98AC-DF30AFFE633D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(2b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"593E5730-3777-4DEF-A1D3-73AF0B98448B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF2207E5-7458-40C5-AEF4-73B271EAB3C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7109585-1433-4940-B7C9-C561DEAF1498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3\\\\)xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F96BEB-19C2-48E4-8884-EA61B32D5BA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"851EF536-76E0-40E6-9051-7412A8235B4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3.3\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E61151D-1658-49B2-AEAA-11F61AB71118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3.4\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49869323-98A1-4258-8D7E-B6DE9DA45CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3.6\\\\)w5\\\\(9.0.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BDD49A-6D71-4C33-8B09-C0E9F2DD030E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B93745-F14C-428E-9A90-47ACE43451EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A0D82E1-CCF7-429B-A637-479E839EAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(4\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(4\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1B2747-4A9C-44FC-BBA8-39E338B30417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(4\\\\)xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65176343-0120-4038-844E-FDE48A920270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(4\\\\)xe1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAE67104-9212-4E28-886B-ADFA9503DBBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(4\\\\)xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01F9B9CF-787B-4BE0-988C-669531BFFAA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(4\\\\)xm1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43D88280-5701-45EF-99CA-3056AD2216F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5BB7513-C232-4B4F-BE68-972B05086ABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C4F875A-D58F-47BA-A441-2362C1688256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCEE111-BEFA-4285-B892-58DE3964F497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA263B60-E7C0-4374-96DF-6E4EB9C16743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C570B5A-185E-4AA7-A8B8-BE80605020FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E17E7C3-53FE-424F-8F47-7B8C70C9807E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E6CE0D-852B-4169-9849-98CDC91E3118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD620020-D5B4-4FE3-AEA5-C43686992F74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B4705F7-8E36-4C2D-A23C-E6002E459F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A0DF3A-430D-444F-BD02-D18D10245138\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA39DE28-F3D3-4613-97EA-11896913F300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(05\\\\)wc8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27476F7B-9DD2-4A7F-8C0A-65EF52F70DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758CF4D4-46B9-4EE1-9C43-0620D1C31EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc9a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62559EC5-D019-4C78-B589-80E16784A821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E52672D5-5DFD-484E-9463-522AA4348456\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wc13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE397409-D527-4283-833C-8A79F3CF8749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)wx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F92CF99B-5043-4EDA-965F-3D8F32F9D742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15295BD6-CC76-41BE-B5A0-A08888207011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1423776F-1C73-4872-81F6-29C411B6E545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xk2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FA18C8-0152-4035-8C6F-9AAC4B1985B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DB7F15-B0C2-4EF0-A3E7-6DFD03C0A25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xn1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE88EB7-215B-4FCA-82DD-AC2A9D243323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"763A8E4B-B394-4EB2-829D-70A030551D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"198E5016-4494-4BA0-BC9A-C588264F79E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5\\\\)yb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B3A893-6322-4E04-803E-1D18224E7AF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5.1\\\\)xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB89FCC-6602-4B41-9BFA-91B0B48827A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5.2\\\\)xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5.3\\\\)wc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238DCBE2-E511-42D1-B938-3FA15E4969E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5.4\\\\)wc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10065276-0C45-4B35-8ACC-9EB8A73E5739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(5a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21703640-6091-4136-A2A9-B046E0A8406E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECCE69A3-41C6-4893-86D4-7F264352C8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(6b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C575430A-762A-405F-95DA-92589BF4C611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)db2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA412BD-1EFD-4FE2-AC6D-E9AC93B1F750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)dc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E45CDF-F745-4336-B5D2-0917C66C1D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE808362-AFA6-4270-8ECE-8FFD10EE3678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CA0B5C8-9BB3-40BC-ADED-3A21DD019A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA654CE6-82C3-43D0-BAED-70E88A740BF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1720AE47-5ED4-4E5D-AF25-F9FD7E43F6D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E339A080-2572-4764-BB7C-F49F66432BD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)wx5\\\\(15a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2318131B-BA10-4C44-8F90-215CDA28576D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E83EFCCC-D01E-4F0E-9990-1F323167B430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xe2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E737A2B-8B1A-4F53-B1AA-ECB354D10D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C977C71-7F61-444C-A0E4-14E5269E6B4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xf1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533BD959-48CF-4664-B4EC-37314AB93EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC5E6E9-E639-424B-963D-2760B2C38D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xk2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDDCC99B-BC23-4101-9D73-A21107FF8630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xk3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED4869D-EB53-4A7B-A630-69B8D76D48DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7\\\\)xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B5AE2F8-53B5-4B13-A1DB-57E2531943A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7.4\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB26AA22-D05C-4B88-8E1B-63A8EFE6A841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(7a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6833BBD-CB8C-40E3-BCB1-193E0E03A95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"387FCCC1-B05D-4493-9F05-BAC5A0E57F15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(8\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E0F459-8A71-4FAE-BE7A-6C56E28988BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(8.0.2\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7976536-FD4C-4AE7-8838-6E28E0CFE740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(8.3\\\\)sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D2F695-9A42-4425-8CA6-63CB8E99F893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(8a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E63F87A-7BBB-4619-935E-F1F0C3C7E322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B6ABDAE-182B-4367-80B6-B8C8ABF92059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(9\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(9\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA03CF9-26C6-4621-B73C-EBABB20CB250\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(9a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B94014A-8415-4174-AF4B-C9026C6EC559\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66FEB240-8BB9-4AD6-8188-836D866F4F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)s3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F41EB6-4214-4A86-BBB5-619154971F7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)s7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E5113C-945B-40CB-9F5C-0B7063704364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB25BAC-590E-4496-AB43-64A8EEBFDCBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)w5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75528B66-3966-4299-B9BD-69B039AB2F02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)w5\\\\(18f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DFBF77-BBE3-41BA-A6C6-32DD555F0AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10\\\\)w5\\\\(18g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D178AF-15CB-4352-8193-741F8B49688A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(10a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1863F9E2-9FFB-4C19-92E3-15DD9ED72608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(11\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"403EE717-FD69-405C-9544-6349CBE09D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(11\\\\)st4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF987B2-BA35-4933-85F7-7F3F2C732961\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(11a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77A942A-4A2C-4A87-A866-12B758DB645B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63FACCFF-1222-4C02-A286-717E954A7ED1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(12\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07E0B16B-D4C1-4140-830F-4F5C0D90AD42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(12\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15063AA-2800-4856-B3F2-F727BE44BAA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(12a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3C8355-42F3-43DE-A2D9-0B77138461FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(13\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BD6B1C-DDA0-4C64-84C5-68F51BFAB457\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(13\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050F0FAE-8871-4A14-9180-4779014D9BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(13\\\\)w5\\\\(19c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92AE5F7-DD9A-486C-AB39-580E8E29EB75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(13\\\\)wt6\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45246611-F8E6-4DD5-967B-815048CCAC65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(13a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3572607D-5E92-4706-8B83-C5CF01E63416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60C7CA43-AB0C-4085-BB46-78A622241E03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\)s7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D7B8E04-A044-4A32-ADB7-9C25B32E9F1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF44B838-8E44-4281-94FD-922A60047F48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\)st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"353010B4-3E37-4451-9B17-EF5701DCE9B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\)st3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"828D84E5-E8E4-4425-9E35-B1EBDBE245BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14\\\\)w5\\\\(20\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BC109F5-0907-4CDB-90BD-61788921DABC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(14a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"279DBE65-0402-4205-8820-48EB20386DB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(15\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8ECE5F1-5153-4F93-9618-CF7AD2B3C426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(15\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC97D92-C82C-4CBF-93E3-4215B11FD896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(15\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"295B139A-50F6-48E7-B42D-9A53BCA3777F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(15\\\\)s7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992DF258-DAEC-4EF1-941D-7DBD347546B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(15\\\\)sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52531223-05D2-41C7-ADE2-E957443297F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(15\\\\)sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4E611A0-B984-47A6-95F3-B582EE0766E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(15a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E93E4A5-6D2B-4E79-B713-7CA1BEE0E36C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2BF480A-AD29-4CE3-9B88-E917D75F3FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2657AD4D-F324-4527-9C4F-360946FE0D89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)s8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"211CF1C3-3A5E-49CA-9D01-AC3DB4A7159E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)s10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C19B39-258F-4A26-B751-8E9AB4807718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641A5B81-B92B-4A65-9828-C7795B0AB4C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)sc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD766E23-7CA6-4CC3-9CFF-4E81E370CFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E68F0B5-D6B5-4012-A563-346FD83AC9B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)st1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C3D66E-C49F-4A41-B67E-D9DE768356FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16\\\\)w5\\\\(21\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09D35D67-529A-425D-800A-D986297D42C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16.06\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC8BD083-812F-414A-8E21-A8119D3ADE7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(16a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD09CC38-FBBD-44DD-8322-F642DC8B6F3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6342713F-C4C6-4451-9637-B744311EC287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F95185E5-65CF-478B-B450-2FA9C05E4A13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D281BAB0-994A-418A-8FB9-C8F6509DC56E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)s7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5E2F5D-ED58-44F3-A26D-D93DCF093C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04586FE6-78BF-4171-8A6A-EFAC90BAC8F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)sl2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4444CF9-66F8-4941-8300-4547BA7C164B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)sl6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C204A1-935D-4CFF-8FBA-9A6E37597E6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)sl9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C88479A3-251A-4D36-9737-CC454640E9F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)st1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CA42C30-EB70-4030-9D02-0F3635C980EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)st5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A4EE26C-9B9D-41B5-9E0D-46D599EDE8B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17\\\\)st8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A125557-4893-4C74-800D-D5A2FCFE6C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(17a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F7B649-548F-46B5-BC0C-AB4013CF290F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E4D37B0-460F-4F16-B4F4-33A4DB80FC79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6018992E-1FB3-4ED8-ADC3-3BA49B76165D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18\\\\)s5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF6C534-3DF7-45A5-8F76-DF75A7EB0E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18\\\\)s7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"684ED113-91F6-41BC-BAF5-62041D850F2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18\\\\)sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6E2071-516B-41B6-A897-799B66907FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18\\\\)st1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BEE0CBD-9810-46D0-87B8-0B46926C2F67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18\\\\)w5\\\\(22b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6710AB1-42BC-4612-99EB-4E3C9A811E30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(18b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BDD3722-C5FC-4AD0-83D3-7E5D2F4B51E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13BB143D-CE87-4B5B-8B41-F641C160624F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BF4CAE-9C49-412C-A3F3-F365D2E0F619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA28B36-9E53-4D2C-9ADB-C878182DB688\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)s2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"801F584F-A11B-4C28-BF74-2917BED984DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6B7A5F-DFE1-4597-B121-BF4714CD2E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F7D5266-C127-4CF4-B1CF-3D639A9E204C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)sl4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A78459C5-2762-4652-8D34-772F3A025381\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96C97A75-1498-40A2-8569-581FB3D13598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52877E55-8DB4-4E4E-BBA1-72F2E1B0C6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)st2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0B9AD4E-CF9A-4772-9E84-6C11401245A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19\\\\)st6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B83B0C4-897E-487E-939F-1E40144399EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(19a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9ECD6C4-10AA-4B34-96F3-7EF6A093EDE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4017470C-5EB2-4E30-834F-EAAF1738B8FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67EC4390-6EDE-4235-83C9-DE8B0BE74539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)sp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C89179A-562B-48C7-A4ED-E98ABC855972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)st2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9032AFE-430F-409F-9558-F2179CE19087\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)st6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587A531C-B3EF-4B7F-872B-7481E38BA785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)st7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F59E7FC-C1AB-4C4F-B1A6-2A30FF64405F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)sx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6C9A4F-1F21-4AF4-B694-6A6F3A6C2170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20\\\\)w5\\\\(22b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F54D02AB-FED4-49C8-87C4-1745FA867A31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20.4\\\\)sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAFB5F7-4343-480B-B3DC-7ADC66582983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(20a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1734A3F8-45A2-4590-9518-0753F503433D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B8735B4-CD22-40E7-B7D2-C7A4B559F7D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EAB9029-DC45-4F55-A4FF-F6DEEDFFA150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5310F83-EB1F-423C-A5EF-681FECAD66FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)s4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"390D496F-AFFE-4CAA-AA27-66E8C755887C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)s5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21CB6075-DB61-4BDE-BD9E-4DBE06CF25E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9AB2EF6-03CC-4C83-B81D-E7C4B2C03B82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)s7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B88B203-B522-428B-A273-2DDFF9CC2898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3408ED7-AAE8-4BD8-9A1C-B7F048C63CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466E247E-5514-4489-A169-513115AB42D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)st6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CEEF0AA-002E-4768-9302-B7CCBBF25C7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)st7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"911BBC74-F18B-470A-A1E9-4D67F5866D87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21\\\\)sx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A4E74E-DE87-4787-8E2E-3C7D77E02224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(21a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"442338B0-C242-45A1-8860-4386A5033C3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(22\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6070D9A2-9A74-46B1-979D-F3F80D69513E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(22\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBB2CF9-2F36-4CA8-8814-C34AE5620942\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(22\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7498FF80-0A4D-4510-9C1A-DA24E1A4A4E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(22\\\\)sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"312DB4D6-81B5-44C5-B99F-D56603C00B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(23\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D448CA2F-8C4B-4834-8B36-B2E60D7A2D66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(23\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCBAB365-6B58-44D2-A078-B3B4369CA32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(23\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332C413B-7AC7-4475-A968-9D0B7EF14B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(23\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35999D5E-F831-446C-B509-F1531A2D1DCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(23\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67DEFA98-F2AE-437A-8BE3-7F021C0AE76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(23\\\\)sx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F37758-9AC2-4CAA-8A09-5A59FC622267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(23\\\\)sz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D11EA0-B7E1-46F5-9FCE-0812A7DD776D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(24\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3630462-F414-4D6B-8766-7CED5366C852\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(24\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D6D0C5A-87C7-4169-B9DC-2AFA217888F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(24\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58DF5979-73D5-4B2E-B98E-CD0AB8517F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(24\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA92F7A-C14E-4186-8E96-51D2BDC40DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(24\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F451B6F0-429F-4B75-93F2-52AF4F65D3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(24.2\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C3E9A9A-B80F-43BD-8A63-762B60D6DBE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(25\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C634FD5-0716-435A-8D5A-0640DB34C069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(25\\\\)w5\\\\(27\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0CCE7A4-A7EC-4926-90BA-B4AA87DAD99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(25\\\\)w5\\\\(27c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EDE5CF-FFB6-463A-B55A-53D76F3B7670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(25\\\\)w5-27d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D8FB0C2-4ECA-4371-B874-2496232965A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(25.4\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B5A4482-9555-4DA0-87CB-3F17EE84EA2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(26\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C17DD4A5-9E82-49EF-965D-DF714DDBFF44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(26\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25058DEF-01CC-4148-923C-7AC433D82E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(26\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179CEE21-E5CA-466A-BAF0-8936F2E0B06F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(26\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F22B210-D1B8-4875-BDF2-2BE5B116B527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(26\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1E0BA5-4A57-4D26-A453-A4D5D56DE66B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(26\\\\)w5\\\\(28\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D95BA23-C2A0-4659-B664-0B7FE74D9E34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(26\\\\)w5\\\\(28a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE1C0D16-5167-4A29-A8C8-3EF603AA8894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(27\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A300584-6480-410F-8399-092682A62435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(27\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00682210-2C86-4912-A423-5F7011C2FA2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(27\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5C5244-8E39-41AE-931D-D935DC3CE00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(27\\\\)sv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"498F4C0D-393D-4406-9752-4E49D6BB42B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(27\\\\)sv1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C87916-D186-4E36-A4B6-5FA858FFC7E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(27\\\\)sv2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF9C316-FF3D-4C52-A770-B8597895BA06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"816276EF-A529-4522-9F49-80E9FF64F795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1336C42E-DA75-4DBC-81E1-70DD987EE54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7042F5-2878-45B2-856B-5EBC93A2BE0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28\\\\)w5\\\\(31a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B74536A-EC0C-4C39-BA91-72990A4886E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28\\\\)w5-30b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E48A25-53DE-4A07-B6B2-A275F390ABAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28\\\\)w5-32a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C4789A3-692B-4BC4-8A91-1F576C27C8B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43C4011A-B88C-49BD-B798-786EAC87EB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(28d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F864A21-658C-4789-940C-E915F6C9F8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(30\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49C8C12-CE1E-41B9-991D-CC3AE51FEA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(30\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F1DAEE2-8026-46DA-A652-6E0CD5A6A657\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(30\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"616EA4E3-C5FC-4145-963B-E3ABAFB5E5CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(31\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B896570-8184-4EC8-8EB3-95312E4ED869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0\\\\(31\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5743923A-A78D-4C8C-99C5-5063A609700C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12434A88-88C6-4749-981F-E2B4D725F48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A4864A2-D6BB-4E2A-9AA4-519EE0732D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0ev:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84299245-5091-4ED5-A107-4F7A2BE499E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"793F494D-F6BD-4B23-92BE-83B9DD9D4A5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B6B0C2F-2FBE-4422-AD30-305100C595CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"932C1AC0-0BD1-46DF-A241-AA71BBD785BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBEA01D2-B985-4575-AF00-144CE2E3024D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3999B90E-FE66-4B5D-8186-66C658855D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C11A2BE-19E7-4148-B3CC-B4956B07273E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E78DEE-1125-4183-A0CD-947B850E956E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6943D9D-4A73-4EB2-B5C5-B7132AFFBE2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7F94E8-86FC-456B-A7BB-57953F67F754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A92DCEF-C205-4145-91B0-DB9991130457\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8B5CC91-144D-4818-871E-E6120A7E1050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E5F43E-20DA-4C5C-B8C5-1A5512CA07B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6333F9A-2605-41EE-9AB4-1D04C5825BAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1050ACB3-E5B2-4710-910B-F3DF4B49907F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE71F9-17D4-47C4-A762-18CC8716E477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7977DA9F-41DE-4482-B0CD-896EEEFB5689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADAB898-7728-4C14-B69A-7B8B06AFC894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDBE69A0-85B1-423B-88FB-CDA80E9186EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14C28A4-91C1-4AE0-8A14-8E98A569F7B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54424787-34AC-410D-985F-511ADB2BB144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70F54F0C-AC91-4CB7-9FEB-257F03547864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A0D017-F26F-4429-891E-C7E1C66B6588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FA075D-4A9E-44EE-90CF-23947C9040EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3DFAEC-4534-4A8D-9886-0723F57C7A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5451772-87D4-42E2-8F48-D137670DA3E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D162976F-87A3-42BF-8C9F-A981B14F4673\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2606209-91BE-4BEB-A163-0D3873A033FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43581A57-418A-4A35-ACF2-1380A8DA8A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC17E231-9256-4600-A33B-238E7E83CF85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6D5468-BB6A-4665-964F-D8F636359CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0AB67FC-88F4-42BB-BB90-54521950DE02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0082D5-CE3E-433A-84E9-1311C8B7899A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EB78A4-B386-4FCB-A21F-BD2B2EFC9616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED30640-AABE-4CA2-8B45-509270748BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86E0B83-3098-47A6-9298-43D3D5F476DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\)db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"960F3C8E-AB3A-4A73-A1B8-E4DD98FACF14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\)db2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"516E4BEC-B9DA-4E21-9271-742F1CEDA087\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\)dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9829AB1-BB64-4D0F-88BB-894FCF9CA2F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\)dc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0ADD1EB-B46F-4B8C-BF4D-5A9631BDFA0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09F6AD8-4B16-465A-9781-1B650062FB6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96541BD7-7D90-4C56-BC23-7071A07711DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89AA56EF-E123-4539-80EA-B94965EAA2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1.3\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605C83F3-9159-4D8F-90C4-886543D2BBCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1a\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EDD9202-56A8-4924-AC60-08B223D5C3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(1c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E960CA4-679E-4748-ADDA-D122C5A2D331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326374ED-7ADC-457A-A8E1-4C42CDB8F3BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A0B63E-5CCF-4441-A6A1-B4EE1A556070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(2\\\\)xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6255AFC2-DAC7-40AE-BD1C-3BFEB5544FF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(2\\\\)xf4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF37C54B-72D1-4D7C-B0BA-0D9C7BA6C80A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(2\\\\)xf5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDF1C787-B425-44FD-8C9B-8F6BFDD42BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(2b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58DAD06-8EE4-4991-8D3F-087CB2D7B557\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6812739-E9C0-425A-989D-E68CE3030E30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)db1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BBD302C-CA25-4DB0-9183-CCE038573D51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)dc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FBD098-4B1E-4FEA-A5CB-DDB9F1E39411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"156DB723-98BC-402A-A517-18D20DA45206\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02516D45-C6EB-4B06-B309-C093E4C75F0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49176A2B-7194-49A3-AACA-2457F3733231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)xp4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE045552-B648-40DA-9F78-DBF1CA8818D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C847187-D66E-4C06-BAA4-4C12DB167584\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8698ABDC-307A-4187-9F53-99F1428F75D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3\\\\)xt3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F051387-6398-4880-9A57-B52C31D9646F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"652D2AD8-3C65-4EE3-95B8-C03173031367\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3a\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30142776-CF36-485C-AD6D-2F245BFD88F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3a\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF621A5A-A65E-42C6-A046-CE995DF4CEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3a\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3061CCE-5295-426D-86AD-7E3905E50E4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3a\\\\)t7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35494253-675B-42E6-90CC-B5510024C4AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3a\\\\)xi8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CDE8D34-5405-45B6-BB59-3D2853123B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(3b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E0C1D4-265E-4505-8570-CE242B5FCECE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F16649D4-A884-45F0-AF7C-754AC68E777D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE87A20-D684-4679-9B6E-3D945CD06CB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)db1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D576D29-F8B4-408D-9982-0F08C6D8E862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)db2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3EB5F43-8D46-4E53-86E1-1B151EDD8068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF5DEDA7-DD61-4E78-92F1-77972B1C9E98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)dc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41285CF3-A946-40FF-A6BB-C52713C2CBD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BF1198D-69FA-48C1-A853-083CE294D2C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)ea1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D7A275-0889-400E-9CAD-BE6C5FE79356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)xm4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FDB25D1-E913-4EA1-959C-5103A860DE41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E06301-E2D0-42EF-AFA2-3FE2EFDE1E5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4\\\\)xz7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD91CD31-9677-4CC2-A41D-FBD005E8E909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4.3\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B7ED6DD-D86C-4BF9-8F7F-7E2383B15366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(4a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0BE079-5746-4C3D-BA05-469C4E7F2C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)da1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F27868-5EBF-4613-B184-18F3EEF037C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)db1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52084CCC-4ACC-40F9-8F6B-3F0C838AE330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A9E4A3-5CFB-4985-A20E-F0681EF0F0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)dc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32D1FD9E-5B47-4057-A6D2-ADD59B968F92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA17170-13DB-4019-A1C1-A4A9A00601DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C60337C-9487-47FD-95AB-8F6D012B59BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)t9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFF4E1E-FAA5-434B-80E8-E6EBE939C6A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)t12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF6864A-9F94-4A3F-B127-323F2220D6BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)t15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAED3057-BBBF-4A5C-B912-013307282E98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xg5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AC91E63-4E93-4345-BC31-C1BF979AD618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05A0F6A-B2F7-4F00-9E9C-002E0E48E1E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xm4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2F2766E-6E82-416E-A24A-04D95459F99B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xm7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA86FEC9-116E-4740-AD42-CF0093E48B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xr2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABC7C22-4E6D-4908-8F64-9EE1574DD635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B717378-F6D8-4A15-8D79-B70EF540CBF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xs2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55F3AF17-076E-4973-9573-DB46967F2CAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xu1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F46869-0883-43B4-999A-21AFCD933193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9607DFF-DD24-4BC1-BC40-04B89AB07F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xv3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A8947C-1B05-4EB7-86D1-003B091F8DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xv4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1D15335-C316-4681-87DF-C259C4A962D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xv5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0572EF-3070-43D1-91FE-3D33A66ED413\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)xy6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41940F9E-3381-452A-BBCC-E8CC96B9070F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C99915F7-2B91-4CA2-8499-F4B094475B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)ya2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4376EDFF-B9A0-4937-AC66-38676A06272B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80262A82-A668-4C85-A9AA-D27DCA9C327D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3F44952-5746-4D27-8025-27FC4B4E9CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11CA7C44-0DC9-40C4-A57B-5D108209D931\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49E8DAE-2C34-4191-B888-BFF2398006E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA64AC20-EC74-4EC4-B04B-D019F91A4A89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"631B088C-18A1-411E-A62F-F0DD48832732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E13FC17-7206-4055-A46D-47421F2F07BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7353F76-EE99-48F1-A68B-BD4EAC823268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"410F01C8-0A60-44C8-8906-AA8AC7D9A4D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37FA259A-F5F0-4D2B-A604-47D21A694BDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yf2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"128421E8-60B8-4986-8033-D0E69BB22296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yf4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B9DD4D5-8D5E-48AF-9B33-1C25CB5E701B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7F832A-A24B-4A4F-BB6C-5DE8A25C4B24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yh3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"251419AA-0212-4269-A4C6-5C497BD2CAD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18097A8F-588A-46B4-A203-01AFEA175595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5\\\\)yi1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"710E3A8C-7403-4BE5-9184-DBAF8DD218A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72C05152-8070-4853-BC0A-01A0A2C226F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2544486-0053-4A71-A55B-E8EC529D4794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5c\\\\)e12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A661E88D-A248-4622-B667-FD2FD4AA3624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5c\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1637C389-A962-4695-AC35-47785C205FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(5e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B11FB8-9490-49D8-AC87-F63F48B39CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A9C34CF-FA5A-411D-94D6-3101625E871C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942A6040-051A-4FD1-935C-54CDF87C19DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)e12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E5CA82-CA58-4B6B-B99E-59D905E7C304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1168DD8-4DF7-4A2B-B080-D267BF815F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCEF5EBB-226A-4E8F-A78D-9C1754F1FBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3316587B-3BCE-4F4A-8835-BDC12A7F12F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"148C0902-66C4-4952-8319-40B8B145A901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1037D61F-BDE2-4956-9B27-25FD5408F1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC077AA-909C-4344-B5A9-F71FBCC34B97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4C9A6C0-F89B-4C11-B415-D78693C0E83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ez1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D7E0FE-ABA8-4423-A126-EE56E4AC6E98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ez2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B3C6083-0A69-4B38-B7AC-9F7DD4D41BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A759C05-80B5-4A5C-8B9A-C0AC13638EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6.5\\\\)ec3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93063C37-AEEA-47EE-A87A-5BB4BB76F416\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDAE896A-4B97-4E67-8A55-046AB7CC0C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0C0CF63-FCC4-427A-9A86-48A03D913726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7\\\\)cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB234FEB-C185-420C-87C0-B54E9463D24D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7\\\\)da2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFE5890-AA06-40A5-B02B-F6E02D6749BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7\\\\)da3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E621324-E76F-446D-9477-DE68A28206F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7\\\\)ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1481AA47-0E3F-4B64-B8EF-13358EDB4B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7a\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E24AB6D-AEDD-47D2-868E-7C2801B8A667\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7a\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0A9F96-4BBC-4154-8098-2E6CD2B9391E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7a\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43155865-F9DF-43E9-B688-246AD46FFA4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(7b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"989069B1-5B8B-4F6E-BD76-3B2999F2BC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF384E8C-2EB1-4747-B749-E89E25A77321\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)aa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2FB3CC-64F1-4204-A04B-BCED3ADE7102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D37BA51-A0F6-4CF4-A729-44C1060DEBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1D0F1E8-B2AD-40A2-A7A5-8AF0D0198E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)ea1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C8E9BF-1C07-47FE-8F98-ED5960D302FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)ea2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DFD542A-C3E0-4E81-AA6C-D32BE269B6C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BC63AE-31B1-44E7-BABF-B8C529283E90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8a\\\\)ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429E111D-F383-4DCC-A378-D7F15234E059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8a\\\\)ew1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B45852-A773-40E0-97D5-4F4A5F6E8D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8a\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA87A2A-E394-4EA4-82BA-9CA3A561C8E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD2B299-8C70-444B-9AEC-B9EAD4650C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37EC9304-51E7-4147-820B-E6DFA9267617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)e14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF5CF62-C9A7-43C7-82DD-3CDAD6218D1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)e15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1AAD07-8EA0-496D-A4A7-6DD72B711813\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)e16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25619ACF-6813-4470-B1F6-0D05D155DFA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)e18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7258C5E-8D61-4ADF-AF7D-F772C0A14C00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)e20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4859372A-D2F6-4D97-939D-91A28B65B1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8b\\\\)ex4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47237CD-540B-462F-8B29-AC1EF4AF868B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3184A435-713F-499F-83D5-51233607861E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C03276-B783-49BC-841B-6A75FFDDCBF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8737806-D06E-4859-ABC2-B6D764AA74A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61B04BC6-B6BD-4CD2-9257-B7493B33ADAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"718E435B-14E4-45AD-8565-CAE1F245772D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB79AFC9-2863-4DAE-9235-56DBD7C4E066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2465A016-415C-4EE9-9DEC-B71C3EDC0BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ex3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71655A8A-9E5F-4B48-A490-2A3110230DCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB6D148F-D29B-4610-85EB-557AC86C7FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"791F8D35-C80C-4540-9FD4-A957F429C712\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\)aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E75B85-BD83-4183-8738-10B7ABFCD333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F32F2780-796C-4A03-BA5C-3B0CDCD2FEB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2046F5A7-EA7D-4C6F-9B93-467AB1CC2624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\)ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA022E55-1EC7-4447-8B1F-1DE2102F71FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\)ec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11032330-069D-4E4A-8F65-BC9EC832EC24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B9352A8-5C48-46D7-A9B9-61C6D003E9D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"401856C7-EDE5-4B89-8A09-EFC2F878E753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10.5\\\\)ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95257024-EEB8-4111-BC17-82173B759397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(10a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB900989-74D8-4DD2-93BF-5A6D50E48213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9B0EBB1-E870-4794-9474-F4E2A8AFEC49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"580BA1FE-0826-47A7-8BD3-9225E0841EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91195861-AC53-4468-B1BB-3144A6F3CB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238FC81A-606E-49ED-B97C-432A82BF7318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11.5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6D3C225-A31E-4E61-9B90-BBD38A8F6C0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330A2017-426D-4D6D-86A1-1D063038366E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FC01431-DCF5-4F12-B95C-4F0813A04070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040B04CD-B891-4F19-A7CC-5C2D462FBD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF29685-7FFC-4093-A1D4-21E4871AF5C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11b\\\\)e14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72872C9-63AF-417F-BFAE-92B4D350C006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA6CBB3-6F8D-40D4-9511-C9DD6F703C14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF2C4D9-65CC-4C27-8240-C8F00F38A3F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A3BEF7-B34D-4D07-A8E6-834F555D0468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC4D8BB-2A95-4A57-AF3F-1CD01F55D62F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93AA3BC4-C536-4EEF-85E3-D521580F18D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E8C082A-A9B7-4333-9ACB-CB75DCB73973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF8CAD4-6B77-4B1F-B3EF-05873051949C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)ev01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"014D2124-5158-4FCB-A831-9457CA435A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)ew4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E89EF44-F094-4002-A325-C765D5CB9B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C9A3703-1082-45A6-B510-9B6C880F14A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ay:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E473130-ED52-48FA-AAAD-A1EA427AEBE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9478F31-994D-4FD8-AC53-B000815FBA92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB275FD-926E-4875-AAA2-88F8DB3B8B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3EEC237-DD65-43F0-9DFE-0D32C929153E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BCF196-5E5A-4F31-BCE7-AA0C748CA922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE497DA8-240B-44DE-92F4-6CAC88A89B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EFCFBFD-E998-4581-B7C1-5A8BFA27DE82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)e17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337A0980-A5B4-4605-8572-8283FD1588C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC069569-859C-41DB-93FE-57E8B3F2EBCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B63153-D51A-40AE-887B-CC9362263602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3F54C6-FD33-442F-9E82-510EA39B0A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ew4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6568612-226C-48A3-B619-4C540D05968A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A9F169-F1BB-4D40-81CF-9772B4E3BFEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13.4\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E6CA25F-5D9A-4996-AE41-FCF9BB9A6C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0097ECF-6FB0-444C-997C-7FA44E82321C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F633F237-0B44-482F-A120-53A90EE0A328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD0E2DFA-B2B6-4FB3-97DD-D1167014323F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6277E1AB-5962-47DA-BCBB-B6BF3A5BFAB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED09E588-89E8-416F-9A7B-0CF73807998C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1229A52-54B6-478F-A419-8D0340336BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2652E42C-E7FF-405A-8B6D-47C28A62757E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A69E21D-CF3F-4A57-9088-C9FF1C0ED5A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(15\\\\)bc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61DA1C6-B112-448D-8E23-07800DA3E3CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2FA390A-9AE1-4C7D-906B-EFB5F927CC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8C2D22-61C6-4CA5-A275-DAEE2CD7D3B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(18.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4ACEAA-2B21-4C3B-AA12-235626E54581\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4944AFEF-D002-4C86-958A-4EB753399FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00DEF5CE-8637-42DA-A371-AC9BF74D213F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970939C5-1E6F-47B6-97E6-7B2C1E019985\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C3903E-94DA-409B-A0E9-A66BCB48204E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54874F5C-4165-4CFA-9908-587A808CF3A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184BB6B9-4E7D-4107-BFBA-847329C59209\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ew3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B06D76-49C9-412A-95C8-4C78C303488D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)fc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C19283-A797-4508-B180-0EA5A1D14310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19.3\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F62D015-0F71-4B7C-9B75-04F495725DF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC9A03B-752D-4F68-B360-CBE2EDBFD8F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C3B6E2-3D33-457E-B85D-8C2FC9DA2FE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41AB141-A566-4738-8E07-E6410590FB0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F074DF74-81FA-4F09-A6E5-18DD9A4E76C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9689234D-7762-4BA4-827E-702407F5BDF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A390527A-7522-4580-8C0A-F68BF90A5CFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4041EB0-F402-4C01-9337-212E3E461AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00388B56-F514-4A9F-95FE-1D8239BE1EF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DEB16EF-D0C1-4C56-85B1-3C07D8CFD493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCFD88F-4320-4F4F-9CAD-BA8A5AA5D389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ec2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D89132D4-850A-4C33-BDE4-51F6A053C848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)eo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABF2BEC0-6D37-4BC2-9A78-FC0D06CE7573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)eo1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BBCCE83-076A-4B0C-9331-B9FE7DA8278E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)eo3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA0B22A1-8B4B-4ECD-89B3-EDB5A14D1799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"379E0F70-EE01-48F9-A4F0-BFCF9BDAB4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ew1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17CD0C63-7500-4A32-BD85-27E6C2F70FB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ew2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDFD76E-0668-4137-A747-8FDE700A3B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ew4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F7143A-9B42-47FC-8626-19A850A74E45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E63F79F-BF31-4076-BBCA-1BC6CC23D0CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7744338-A68E-4F38-8C89-E07DC4BDCFB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E01A6F-E21C-414E-BCA2-F7490DC78147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB440BC6-9FC8-4EFD-B05E-3F5A5A68F8EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF4A473-C851-4D2F-A22E-66A267A1BDB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD4687F-D78C-41C8-B2B8-D140813A8619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8C33CF-9FD2-4DC5-B69C-0C8E0C6A987F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DFF09A6-DE59-4CBF-AF02-DF2862C05D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F7112F7-C3AB-4B67-A58B-A04E60F5F244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(23\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A43DD0D6-6890-472F-AA0B-75B218FCDC6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(23\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB58F9A6-9298-4C47-A3C3-5C1DBF93E65A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(26\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"038514E5-49BA-4E0D-AEDB-6868117E0B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(26\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0563D082-E449-40F0-93EE-437C1780CC75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(26\\\\)eb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FCF2E0B-0747-42A5-9EBC-22E81DFB2112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(27\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B430330A-8D7A-44F1-A338-7E6F702FB70A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(27b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A38345DF-A94B-4C8B-9F4D-9D70BC0ECA80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6FFE33-2891-48E5-9D0C-C52F88B2D76C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"442972CD-50D3-4C46-AB73-44AED94B9F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19077C39-A27B-4EC3-A882-9AC826E61570\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3B31AFC-9C72-4737-B6B7-E938C13695BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEF6AED-4477-4AAC-9759-1996B77DFEE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9427851-B0DC-4CE6-8BFA-60619D1DC87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D07DD94-0925-4FEE-9565-5F36B9AAF448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3A67F5-05C6-4097-A88E-0A0F165C12EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7126E176-D739-4102-8F10-1EEB8C6A219D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E90C0554-1A50-4341-AB07-80AA854673D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A8C5149-40F8-40C9-9FC3-7E7C68801320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46FF39C5-CC37-4573-BB18-36254D38509B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1AF45D8-A32A-482F-8183-F0DC3C4FB5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B377A8B9-90F2-41B7-9098-5ABEB621E2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"896A71EC-9508-406F-8DE8-58953D9A30FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B15FCC-1BB3-41CA-9550-6D55DD381F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A85892-C3AB-4920-A949-A71BD0332D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6330829-9A7B-479D-B38B-BC64148EC172\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9F1E38-3482-4EAC-8654-EBC004B9344B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BCD9C9-7E6B-42EB-A645-32B3C00CDDEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A61768-E18E-4DB0-9EDF-2E36D0F62DF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6B13CDA-C376-412A-AF5D-8FC25C74A0A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EEFAB2C-172F-45AE-9C84-A036AD22B5EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1sec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3EFB16-B62B-4D24-B99F-AED2CD35C28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752C3C6B-910D-4153-A162-DF255F60306B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1x\\\\(l\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B11A6E0-36BB-44C5-893C-59AC283E515B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297FAD97-60C0-473D-A18D-03657B81B7E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD4A33B-B13E-40C6-B47F-A406ACC6664F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E488E6E-87F0-4292-B97B-31087FDB4655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D199CB1-A2A3-4678-9503-C5B61281755C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19952DC6-1186-4754-BB1E-BA1D78A19C96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441CB9D6-5EDB-457B-B59E-D48B01AEAF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28097F62-B51F-4A3B-BB31-6FA67E8C8B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E8AF76-0A1D-4BAE-BF10-D63080352E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A11AF3F-C82F-4431-9CF1-84FDAD388D04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B674647-4438-4450-9DCA-25184D4E2682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E5CC41-1344-4A65-A653-8012ACE2CF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71FB7128-CF11-4903-97D7-418403A03CD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63EFB20A-78E2-4BA1-B87C-BB74E8982D99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A273401-9394-4BC3-879C-DE3EFC09B3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DABF911-FCDF-4095-A95D-4BB73628FCA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77886493-C30E-439E-BBB4-3D34A8938378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7813F511-CF6D-487F-9D1C-7A6CF85AD724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677DC4B6-8B3D-4A0D-9934-743FD7494DF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E272881F-0804-4190-A21D-3D0B9A774F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12B39FE-3E7B-4D96-8CD4-0D57C50A786A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F084DA16-24CB-41D1-92B7-C6E0499AAD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA979D75-F60E-45F8-B99C-1402DC8CFCDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194F0AB1-92E6-4CE3-A5A1-904BF75F05D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"884753D4-3AF0-4723-9D51-26BA7B4CA533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF3601D-DF44-4A10-A424-8E97C65A36A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC38BD6C-9823-4D2A-8BE2-60AABE3C4932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1835410-77EB-46F2-ACF0-379759D4B0D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB103ED-B170-4193-84CD-4C59F4D6A10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88DCCDE-6A81-473F-B4FE-95A84F8DF964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D55886-268F-4E4D-B00F-8A5D97A73BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7C6FB8-8393-4916-BB2B-3097B1995C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF86B641-08DC-404A-9718-F2A99C1B0889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)dx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324E754D-D755-4987-A892-D04A0690DD80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A304F2-D112-47B5-8859-10FF62990368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"897A6F3D-9C80-4E3E-B3E3-5CA48227CA4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915157AA-15BE-4792-95D8-4D1E1EF34EB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38C9EE3-1A86-4930-AEF7-EAC3A2713DF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"742CC70E-68FB-4658-A475-E7BBC5983878\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CE5741-1569-4B69-B7F7-094F0C6101AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B4D71A-D418-4E6B-88F7-50833C00236C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD14702-51AC-46B1-95A3-4AD47A4DCD21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xe2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA8E55E-7E11-4D46-A1BC-B3655906FDF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xe3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E16ED18-4EB6-40D5-A857-6398A78693D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979D4077-A3CB-4134-B180-EF10F01413BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C96C90-8B2D-4A88-A4B8-FA43332BD8D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9B3920-D3F1-478F-ADE9-6022763E8740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1\\\\)xs1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC9CF50-E0F7-4513-B7EB-A2E095D3E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52332F68-2C6B-4226-9B36-345AD0A904E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1.1\\\\)pi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1FCC6A-332A-43B9-B8D9-513D9B0DB374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1.4\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13AA694-BAAF-4BE0-B900-4C2BCCCDA00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD94AB1-0D8D-4DBE-AB1B-6AE464743E75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1b\\\\)da1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC4C28B5-4591-49E0-80F9-7C6059F24B46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(1d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D6897E-33F3-409A-B874-501FFF989EE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE975E4-1D07-464A-8116-69393D07C362\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)bx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FFF0815-8F37-4613-A54D-42D7AA299D05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)by:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB420B3-E9DA-4C5A-9299-FFAB48734116\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)by2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFB7CEB1-84F0-405E-967A-A62B54B7CBCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)dd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BA91C37-5799-4B30-97FF-76A6A84F3606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD6F2B76-43DA-4C2B-AA6F-C6A4BBF7DE12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD6C223-10B9-4381-A4AE-77DD415B5AF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A3E8C4-0E94-4027-ABDE-47A364071D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07398411-7920-4B52-92C8-3696F49370B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"371FA715-3966-4071-961F-12E691608DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xa5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E2713E8-3E4B-4C60-9ABD-01B962A85A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5400D72E-CD49-41E7-BA47-33E3AB920320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A44418C-C041-4A98-9D1F-1E7510B9AD1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474FA3DA-6967-48A6-AAB4-E7C382D3C942\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xb11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2808EB6-5964-4931-AEE2-BE1CF503B7E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xb14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0CD136-C54F-41F9-9969-9F367921B03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xb15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABBB62E-EE60-4E80-9208-A6F5C1F80C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78C39B9F-E597-473E-8297-6D1E8D9713E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E319FE1E-8D75-4CA2-8EA9-C1C32C290891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82C4003-D2CD-4243-8A8D-B8A9B449D096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29056463-CDD9-4399-964E-14BDBFF760A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xh2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"259BD3FC-FFC5-44B7-8641-917A1BF2E98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xh3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F414DF-19C3-42BC-B43D-5CF60A3C0991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E32D7BFD-EC96-464D-81CB-E9CC12C21EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xi1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32421120-BCA2-4218-8CB3-C77452A69295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xi2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03537E8-D899-44D5-976D-A6E10FF16FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4C67B0-81D3-4430-A9F7-6F15C601693E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xj1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520E6B5D-C163-4633-A2DC-D02335838FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA145839-3DC4-41C4-96B7-88B8EE87D70E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xk2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC95C37-9102-45C7-813A-15A0ACFF5D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8D649D-474E-4661-A68E-517EA3563CAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"420C23F6-1E44-418F-B6CA-DECA22218B87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FEB158-215B-4C9D-8882-D44EE7F90B60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xt3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BD8E31-5117-4E79-92A4-5FF08BC8BB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"274DF264-D0DE-46DC-A91F-DD53ACE06AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)xu2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC678F0D-4307-48B9-8C29-9E85DB756809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2\\\\)yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D917117D-CF4D-427C-8529-EB2D856E8A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(2.2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCD87D10-0406-43C0-B961-47BAA4264641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16EA6782-77F4-4E2B-A882-A24ACEA5776B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(3.4\\\\)bp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80D35309-D236-4F49-88F9-AF29574630B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A33120F-F2DD-47A6-9BA3-58989C3CF448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7840C1F9-C5C6-42BE-97F3-BE6F174F8C87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A82EDE9-A7BD-4F36-8A97-DDDDAC45D80E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)b1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8697C1FE-2EC8-4116-809D-461801FDE1A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)b2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4181019C-3AF9-42A7-AD01-28B17AB6DE5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)b3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C7265E4-1EE9-45E7-AB34-9BD6AA13E51D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)b4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5DC2C3-1DF3-47ED-BA83-9C9FEC2FD8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)bc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B2979C5-DAF5-4A29-BD21-F6B0173574E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)bc1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8FDBABF-EDEC-4E65-925B-E4FB97FF27BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)bx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E26E18-5F6D-4C34-AD4D-CC69135DC9B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0200FB78-35ED-4CEF-A49E-52D6F8F6102D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BCFAA1B-DDCC-4E2E-B9BF-B51E0B5710F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)mb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213AB5CB-DB2C-4939-94D7-E211AD817FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)mb12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A1F18F-77EB-4BE9-AFF4-00187613E5FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)mb13b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C785F596-113A-4B2E-9963-4D740F15DF7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)mb13c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93B704C-55B8-4FFF-8910-314604143411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)mx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAEC62C5-DEAD-45A2-8339-EDA980833ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)mx1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D1C216-F510-48C6-9065-708408D8CE1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8330DE9E-EF94-4402-9B3A-AA876F9F0035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9934E886-22CD-489D-B90B-FD23B6A2D722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51DD991F-682A-43E5-9BED-58F524616A9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)t6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA2B86D-05A1-4F17-903C-5E14A98493A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB4D744-B7FA-41E4-8272-BC71C413BAA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)xl4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06997F81-3A97-44C3-84B4-0868E0D20CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EA73E8-D40C-4E1D-94E9-E6FA63D7C253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)xm2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4478DFE6-341F-410D-967E-EFF8B67A2E80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0570296A-6F1C-40E1-93F8-C23BF4330E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D79D38C9-271A-433C-9BED-C4893C2B0260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)xw1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5507D5CE-F07A-4BAA-96E6-96A67F4C0A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1119AC22-9A4E-468D-A9A4-27A4C9191F91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ya1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A326CF-ED69-44A6-B7BC-3DCCC2A1766C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ya7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76FBC72-6021-4535-8CD1-DD4208FD9CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ya8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D992EE7-4F7F-413F-9E4B-A7722249A74D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ya9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FA74A4B-A292-4825-9DDD-403A7EBAF007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ya10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A282CADD-CE0E-45F7-AE48-BC42133BF16F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)ya11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89A62A5-38CE-4BA6-8330-8345BB0F7B53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(4\\\\)yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DF8F59-0C88-4E38-B9A5-12293A2FE722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6829DD-33EA-40CE-A01B-EAA7667CBDF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(5\\\\)ca1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C9A347-8EB3-4651-B7F4-BBE72E87B6DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(5d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F327B39-CCBA-4B2F-A083-CEEB625BD836\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(6.8\\\\)t0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AC7DFB1-014D-442E-B6B1-400B1F4BBDD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(6.8\\\\)t1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C289616B-36BA-440E-8380-5523844C2C5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(6.8a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D295C746-6702-4DCF-91FE-62810B37549B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(6c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B858AB50-2EC6-4820-801B-5EAB72A0F947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87CED27A-7885-4D42-8A91-128BD76EF585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(7\\\\)da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A057D34A-C0E0-4DA1-8E51-2E7C2572D28A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(7.4\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33AFA64E-4181-4751-B93E-EC067C97FC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(7a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A65C0314-7816-40C4-9950-1B40740204E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(7b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84CAE9D3-209C-4663-BD5E-424928E152F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(7c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"191428C2-2F39-49B6-9ACA-E4C1A46F6C6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)bc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D67FDB9-FA6C-41F7-ACA0-AA04066B92F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D359AB74-8958-477E-8B97-F5A1FC3BDC76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"402CF7F0-EC7B-474C-98F5-F9FA3486E45A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)t10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BBE9430-02C3-41AE-899D-8935F3EF215E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)tpc10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0977D51-0EF6-4219-BEC9-400DF80B356C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A331B245-2FFC-41AE-9E17-61F6E9AD002C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)yw2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139DE650-5861-495E-9B87-6C9B68AA5233\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)yw3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A7C0DB-63E2-447A-A66C-1F7419F1EB3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)yy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70E5F20E-18F9-4108-AB48-E9A4DBB230B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)yy3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91D2A28-D85D-4F62-92ED-11317A9C5947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(8\\\\)zb7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF4480F-6C08-43B0-92C5-3FE07B5E09D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(9\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F575CA7-9875-4582-B9E0-446DE7227073\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(9.4\\\\)da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3021A9C0-3504-4B98-AD5A-9DB93E8803F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(10\\\\)da2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55396406-FB71-46A6-9CDF-27F041605097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(10\\\\)da4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC774495-327F-4488-A257-1F3C5FB2E00B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(10.5\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0922A76-8F2E-4898-9AA6-32A0E3F2A8C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(10g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21E013BC-9F5F-4209-9588-1A3CDB017659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)bc3c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B059AD2-3215-4647-B4A6-AC9642E5623E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"665CB7BC-E97E-4461-B83B-681047A6EEAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F7E536B-DD9A-4F46-B8C1-F29DC3298972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A9D069-4C88-4BE1-92E3-8A7056DD8825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E735E1-79B9-4FB3-B994-63D15AF6DBF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7861C0AC-51C3-40F4-8D72-061153D71E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)t8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B57355-CE86-4605-9123-15B1445C226D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)t9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"617CC100-06BA-4916-A2FA-EA91049DED27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)yp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F60222E3-B02F-44B8-9E64-DB8AE3BFAEC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B52D7F7-AC13-42FF-BBDC-FFF4A25DFD54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)yv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"574C686D-F7B6-42F5-BBE6-AAA61425DF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)yx1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A62D04-0DD5-456D-8C13-88A0DD3E1FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(11\\\\)yz2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD2FDA81-E862-45C4-BB48-152BB4C33BB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3568B82-1112-417F-8F2A-ADAC7BE9D0D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12\\\\)da3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA67A2F1-F728-4776-AC96-0FB1C0326572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12\\\\)da8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37C0F9A6-F438-44B2-8CA4-F8810160801C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12\\\\)da9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DCC7A72-05CB-4283-82B8-3F5501CDF923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12.02\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06B7024-F66C-4642-8BDB-5D88B66902DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12.02\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BA5828-6F26-4F92-9B22-C1A403D34D85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12.05\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0DDBD22-6C29-4275-9BB6-0F9E7717D382\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12.05\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4569DDA0-1961-4CF2-ADBB-055144B6DDF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12.05\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8BF6E5-BA09-4EBE-9C06-28CD8397AF69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD9B22DC-353D-437E-B648-CFB39D6D34BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA8EA12C-A99D-4FE3-B18F-715D49764320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12g\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B7CC6B5-44B7-4DCA-86C8-F032AF65FDAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208A52BF-BAE3-4F5F-9279-88C360FDCBC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F081454-D139-4630-BCCB-172303F78DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(12m\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F440A82E-518E-4E35-AC1D-7B2BA9963EB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E926A720-D79D-4A81-8E28-137CE36C4995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FB70336-4345-4B02-98A9-A8F1A16657C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)mc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E5B6FEA-3AD4-4401-96F6-8DC986D6509F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59169A2A-FC3D-4C62-BD1A-F6AB7653BC23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB000AC6-C4C6-481E-A75C-7AA81BFAEE10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)t9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE016D9-FA6A-4FF3-9B18-7CBC37CEB136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)t14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF7BD28-EEC4-44C3-B54D-566A3D450D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)t16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBA5AA2-2AEC-4A03-98AE-F7FD59E1944D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37DA4E81-4BE9-42FD-AA1E-E99FE7817FFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6F77A78-FFCE-4BD5-A027-A3AE81AE4C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA235645-9AC4-4876-A512-425097C5D2D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8886373B-3CEF-4B67-9137-736191C10D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)ze:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D71C31AB-60C5-41D3-9C28-E11D8C87BA15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F26995-8997-4665-B277-42119A370FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F5E02F-2EDF-4C24-8279-5602638E0E26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9585CFD-C563-4D76-A606-6C629B0BA12C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zh3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D193A196-05E1-4143-961B-E8100C7A7323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zh8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B01E7FA-7314-4E50-BFA6-3E2E5A4552D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3BAAAC5-FD95-48C1-9834-A0BD5BB16699\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A47C78ED-4BEA-4DC9-8FF4-11DD8803AAB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13\\\\)zl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4CE1FD8-530B-4530-9109-76F852C196FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13.03\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64098AE7-DEB7-4D7B-801A-AF624C9E00FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02879682-3521-4E10-95C7-4F3C3B488B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(13e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20087BA2-1C64-4741-BF0B-7DF45DCC9364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B721725-3499-4653-8489-A0337FE08215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)s13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6181F56-00F9-4FF6-8285-271D9E1FEA5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)s14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC33DFE-2514-4A75-AB59-8EA0C03187B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)s15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034A3445-32E6-4CCE-89A4-DDB6DE25A9BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)su2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7682BC6-5FF5-449A-905D-2178C16361F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sx1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C60F5A-0478-4CF1-B621-4B747DD02A77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD1F4148-E772-4708-8C1F-D67F969C11DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sy1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CEBCEF0-5982-4B30-8377-9CAC978A1CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sy03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"936E22FD-5210-46F7-89E5-5458A9C58F77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D9BA55-F193-4BCA-ACC2-BBC892E9D7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46974023-379B-4475-A59F-BD340043CFAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D71C21E1-BC04-4537-B64D-76492F282B76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)za:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26835676-2738-47CB-A364-78D1964FEC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)za2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209A1BE7-EEFC-476E-84E4-4EFD68DD7E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)za8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B9BF07C-DB46-4646-A11D-FFC5C13D6387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9802FF68-2932-42F6-B66F-545A59FB5EB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14.5\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E51D01E-F3CB-4413-985E-D72F71D7B423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3DF4A1-DF61-46CB-AFF5-9B7DD6F93317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8421C4-3CB5-40B8-AB20-5E883FAC276C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9CDFBF7-D393-42F5-89A8-482459A426A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bc1f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D17BA6-BA60-4019-8034-302777B06CB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bc2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9185C8A1-426B-4313-832F-18B2F9507DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bc2h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F4938C9-0511-4AC3-85F0-44A0AC8D5820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bc2i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D137683-0B21-45E4-AA17-FCFA1085499D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"864B17DA-90A8-40F0-8885-3F9E47589131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)bz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31E2E42C-DB5E-4534-9BE5-E2717E96C784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32737FE9-2E17-4DA9-B3DD-6B5A4CBE2C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)cz3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF872FE-9B30-4D0B-B129-6A317176A517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)jk2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C5B2939-F4F2-409F-8FFB-AC7B0D6C7B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)jk4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1562A3BE-7447-4227-BD04-33C248F04C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)jk5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"711839A6-984E-4341-B7A0-DFEDC31FBF23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)mc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C02477E-BBB9-49A2-94CC-9457DC928EB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)mc2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05CA5BF4-05BD-4B26-A49F-AB3897B563CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)mc2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2360BC32-F9AD-4407-9BB2-C19CC190B1E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)sl1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B71B83-3E4E-4ADE-97CE-F72B52E41BB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"284DFE38-63FE-45CC-8CF7-B84050674EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A424753-62C6-466F-BD19-047A1611A4FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A353C2-69AE-4343-A6FF-E0736836EAD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56E5E477-2236-45DC-900E-75FAB2E7DFE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67A7F96-5B78-4466-B5D4-3811C6DE7A1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA1CEF76-1CB2-45BA-856C-3E23668DF0E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB35113-BA54-4DAF-A293-2B6B328A5CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)t17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC5651C-AA17-4275-997F-C85FB48D7ED3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC2B0007-128F-4B50-A7B5-3985C40890A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)xr2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A12EE4BC-9C6D-4791-B99C-5F1F0B89BA41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77166237-71D5-40EF-AE47-32CE7BC300BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)ys_1.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"882715D1-D669-4107-A39F-41C27084B2E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE530211-6ECF-4881-A069-826E0737CE5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zj1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5C18D0-B516-4F5A-AB43-B3D5FBB14202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zj2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB1FC76-DFCC-4F06-A320-82C27A502B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zj3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C17E0E7D-E7C0-434D-9142-F8A93BF63FCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C81871C3-7AB6-41A1-BECF-2F34ED208E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FFB25CF-C329-46A0-A404-36D951C7A0B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zl1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CD80CB-7E2D-4DC0-A84E-D9E1ADFA141F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"776DCDA0-839D-4EA2-8C0C-D28E897C1E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15\\\\)zo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55827F80-F1A1-4538-85C0-069413E3DB80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(15.1\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4B7EF3-FD99-4CCD-B05A-807EE53A58BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(16\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF6730C6-1387-4A52-8778-7FC144134AC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(16\\\\)b1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D461538-0218-40E9-A74A-9982E4075485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(16\\\\)bx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79433418-CB13-4F11-B606-3D804926BB43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(16.1\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB1A7354-F886-427D-943A-388824100550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(16.5\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0C0B5AD-229E-4406-A5E6-190067352BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(16f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"680AC7AF-998A-4584-8087-9409A7407AFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D298FE2E-227C-4385-9DFA-55A2D5C04E02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17\\\\)a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCF5B18A-3F59-4CED-BADD-6C7E41E2A28A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17\\\\)zd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B284ED6-7182-4138-9111-8DE89F9EBD77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A28E43B-9153-4491-AA25-0011732C6E4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17a\\\\)sxa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7F49F3-0A0A-4270-A657-CDE987637684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17b\\\\)sxa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BC22162-36D7-43C0-966C-2DD62CA1DD6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3514C99A-95B8-4827-A9D4-E8E851D7FB2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17d\\\\)sx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8089D89D-AF38-4445-82BE-61FF2ABFEF0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17d\\\\)sxb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E947BE8B-DB42-45E9-89E9-2E42DF6242F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17d\\\\)sxb7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30C6E0A-6D9F-43EF-A202-678BAC2C9950\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17d\\\\)sxb8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95CE4197-A9D6-4DF5-A8F9-8E1520D80D70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17d\\\\)sxb10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E2A7C58-5AF1-4486-B81D-A68DC3D738AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(17f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75999E88-10C0-4F99-9F2E-7F2325E2737A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E49B392-5366-422D-A10E-EE4F3A33C4B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)ew2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11BE83A-EE4B-4495-BAEF-EA4802FE5376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)ew3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A077B6B3-F0CA-45BC-8A62-EAC12EB28FBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)ew5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E46610-76B6-4C7D-AC8B-64B24CFBE303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)ewa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF707A6-5834-4295-8B38-17F279D49C82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0E67EE-AF42-4B53-B70A-45562CE164D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8942C0A-8DDB-46CA-81CA-0DA442C27502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7979BB-03BD-495B-8C4A-EF916AC5B546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BCFBB45-4784-490A-BDD2-DA2D54C792B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E3AC772-803C-499C-85E7-7176688DCB4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E319ADC-C636-4933-BD50-B613677AD4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)so4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF320DA-468E-4E40-A55E-E74EA44A3122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A15042D-EB07-4754-8144-947CDE669CAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sv3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DC2BB88-ECB4-4F93-BDE7-8486852AB27A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E58F4903-E834-4476-876F-8C144BD93D4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D890842-FBBC-4D2F-8403-E8FF383A0289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A59C144-2B35-470D-BF33-29CA7EFF2ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxd5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0B9E6B-439F-4623-BE70-68F1835747BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086B1BAC-0C9A-40C7-BEBB-FF0E1FC72463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxd7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B94D83AD-D5B4-4968-8080-92CE49A1494C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF6A337-FE37-4CE2-B0FC-AB0AE099C10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxe1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0076A522-5490-4D31-A10A-3611B587E5C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxe3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A041C16C-8A48-4470-B1E9-3159C3463A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)sxf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A523641-0044-4A2A-9097-D32504F2A019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20E75F7-CEF6-4985-942D-F054879C312D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"532987C6-8D68-40B0-ABB3-236C49A63D31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(19\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9045CACC-F1AE-4924-94FE-825DE629C415\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522425D5-1EFE-4F07-88FE-9EE4376D7171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"145A21CA-3E35-4F73-9451-72EF1265ECA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47186E81-9EAD-4AD6-B888-F1F94C2EA128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955BF110-FFBE-4368-BE06-21AC794C53AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ew2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DBF354-E96F-41C8-A393-077682738B4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ew3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93FC49A2-CB0C-43CB-86F2-2D4483CFE5F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F08381-956E-4E97-8226-6EDC66C281D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54CCAA24-53BB-4998-B986-358701A8A8F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B2560DA-E091-4344-A7D0-9BEEB6998AC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10151339-0261-4F5D-9601-F048C0B70908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2498113D-65B7-4144-AD1C-9FCB6534B7BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84685E46-066D-42B4-8800-7D529AFC4FAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99299759-15D1-4BEB-95D3-8D53C27674A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4528A0-A342-482E-BF87-AB4B7EC69C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2C7EF6-410E-4D27-8C09-D0CEFDA360AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326FC2B8-62F0-46B9-961F-4D5526D41A7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA90AE6-0BC8-442E-81F3-49E6C8D71F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(21\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9324BF58-67E2-410D-AA71-F280B3D64498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(21a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"060D7CA2-0A02-49E3-BCFB-EFE7F6EC08F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(21b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3AAE391-8039-4BCA-851E-CC3992BE7F75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(22\\\\)ea6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"848E6315-3901-48C5-95F4-81A397485C47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(22\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B20E6F8-5E33-4F24-BB8B-8B61E39C01E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(22\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F657AFFB-B3C7-419F-82A2-B244186EDD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(22\\\\)sv1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"777381FD-8BC0-49AF-A4D9-83FC7E601BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(23\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"947062EE-A5CF-4A7F-8EF7-921F45118268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(23\\\\)sv1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"099D2308-DAFA-4790-AFD8-066B841CD0C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(23\\\\)sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C78ECAE-978F-4DDE-83D4-DCF4ECC20EAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(23.6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24044D5B-B73A-4873-A36E-E35B8A6AB087\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(23a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04D1C25C-1BED-41F9-8CCC-044065B7572A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(23f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B55C5D-F153-47CC-8E79-94B6451D04A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(24\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4E83FE-4A5F-49A1-B6E5-B39171AA8825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(24\\\\)sv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69F16A8-ED8E-4B89-AA80-CEF9C488A03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(24\\\\)sv1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"016CB579-0452-4DFE-8CDE-D3161579DDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"878773DC-1360-4608-AB17-0081B33B11F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C2B085A-57AF-4A84-A354-166E61B5CAF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A35979BE-B33F-4709-8B36-FB8297E321FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66130668-1107-42B3-BFAF-5640D3AC7595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7346EC5B-4F87-423A-A579-AE0E1583190A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C22E4042-3628-4A7E-BD93-1F3F282F9E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84C2CA8-1BA4-4899-9AFF-443FBC5003D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5E50CF-9084-459B-AFE5-5E0C63E17AB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC9A8EF-FE37-42CB-A33F-4B6AF29A8827\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ez1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0C9F1F1-EA5E-4921-A862-06304CE55C4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8508A0FF-D18D-430C-9A26-6B5BBFD7DF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"393A274B-BAA4-46F3-BC35-BE697B96A684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA143186-1E3B-4B5F-A5FD-AE90A2664AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4912CA3-2311-4D0F-8767-6815F43BE645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092374D9-6DFE-45A8-B3F1-562C56787304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E5E380-4843-4E2F-8807-BFBDB42CB734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"065CBFDD-BF57-4FE4-A48E-03CFDE5530B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36953AD6-CE36-480E-8679-DE5EEBCC5A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F571ECA8-0AB1-4BC0-A6AE-06BAE1FD2375\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E67F0D3-5722-49F3-80FA-8BA7292C085D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA79BC8E-753F-4245-9885-A7A2733E4013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B820873-78DF-401B-8A99-EB1F115FED35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F88317-18BE-4484-A027-D69500937799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF6CCDEE-0D38-4C6B-82D8-CDE5067CC704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sed:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C342FEA-F2AC-4E0C-946E-1F7DB2994D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B142BAA-613A-40F8-9FD2-EB081867B3F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sv2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1036B4D-4666-4BCC-9345-2DEAD2F49ABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A3C8845-179E-4098-842D-2F886885CFFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sw3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F5683A-5EA5-4991-A677-2390477BA8A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sw4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF0E312-0A76-47FD-BCFD-39ABDDDB99A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sw4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B3D41BA-41BD-4F4A-9CD5-1EDA026F0979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(26\\\\)sv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183C82F0-09A5-406F-9362-E268335D4F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(26\\\\)sv1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A1F98B3-23E1-475E-8CC4-7E39D091BDD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(26b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40966B8-23E0-4ADC-BCEB-74DC2FA7EA3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(27\\\\)sbc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ADFC5FC-CE15-4C83-8E11-7CC29EE8F32A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(27\\\\)sv1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3C951B-527D-4C0E-A1AF-D0F6871AEB6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(27b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D4091C-087D-4267-B606-664EDA55DE5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(28\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"968C42F5-9FB5-4442-9314-9D0156DA4719\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(28c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1625DE6D-5848-436B-A220-C0D1EE3ED0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(29a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F018CEF-2A91-4067-8104-63686F9489CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(30\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84F12CDE-0C47-433D-81CC-EE33C3C36B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5BAE50-27D4-4BAC-9C15-0EC889139144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E314B0F7-1A27-483E-B3B3-947A5561281F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05B838C9-E60E-46A3-A5FB-4F67291D0851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B29F111-CBA4-464D-8B25-C2677BA270EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96C76C5-52BA-45D9-9803-048E770BAA84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42EB3A6A-8B37-47E6-AA9B-1B13FC08F542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22D57BED-1D99-4077-941C-E60BEA65324E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B9E2C6-0E23-4AC9-906F-28BBC15868DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7F75542-F2C5-4CEB-B655-E0620408A3B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7EA3DA-33B3-4480-B3B8-413745D6C5FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDC41749-91FC-43DB-A52F-AC3E3A2205C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0195AE-24FD-43B2-892B-F646B8B5ED6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E71A69-60C3-4F63-B368-A9AEE6E501A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2eu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA9F8FF-94EA-4D1D-93AE-623075014426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"316924D4-10D4-4C98-AF05-DDE1D530A205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11866346-C29A-463D-A18F-528C23DD579E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0912492E-565A-4559-ABB8-D2898F06CF29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD6421A-D8C4-4A3E-9497-4AC130CFE597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91F44EC8-13BF-4032-9EBA-0D50C6A353BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD1C019A-0B91-4A3C-98DB-F467C054AA15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370EEE74-3DAA-4BB2-9192-66672229DC39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF74B28-CD95-4BC6-97D4-D529D30E1509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B98E703A-717D-4997-AFBC-CAE4B644025D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01A0A03A-5BFE-4A15-A983-B3EB8EE6B25A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2jx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4BC2FA-19F0-41FC-9786-8006B1D2E7DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B27825D-099A-4733-8D3F-8EF2B050E5B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A63E2B-8C1B-4EF7-BCDD-BBF3EC2C7113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED8A1FE0-F74A-4C92-8625-7C933128B567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E90AD18-3ED7-4DA9-A6DF-281C1F3226D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2pb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB3BD76F-F93A-4902-B4F6-4D9231C29EDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2pi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD6BA55-0A6B-4981-AA70-4D1FDD49B996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D035A35-D53E-4C49-B4E4-F40B85866F27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC41CCD-96B0-493D-B206-37773FD65388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1579A2D-955F-4CC6-9F94-9D40C669D903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05A548B-C443-4C15-B636-64C1F9B9860D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87DC8B40-2093-4D3A-B18B-F95868A36D8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB7E760-8260-4488-B9FB-C741C1763F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F4B373-490C-463F-B518-89D0CABB852C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E85ABE5E-7900-4A9C-A945-48B293EF46B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA4B787E-5700-44B8-8C98-24DB1983AE44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1A9400-571E-4955-AB84-C49A4255A5B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC70491B-F701-4D33-A314-C686469DBD2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"198C24E9-6D45-44FD-B502-D14ACDA99EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DEF14D5-1327-4012-913F-DA0E12C4E953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE0B5B8-DEB1-4021-B854-177C0D9FD73A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A672BD-87AE-424D-8735-073BBE9CE164\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95C033E3-184B-4AC1-B10D-8318FEAF73FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A68D177-B028-4025-BD7B-82ACDB2D1E21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"485ACF9E-1305-4D71-A766-5BE1D748AAA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09458CD7-D430-4957-8506-FAB2A3E2AA65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E709D6B-61DB-4905-B539-B8488D7E2DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84900BB3-B49F-448A-9E04-FE423FBCCC4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6C1C831-556D-4634-AA24-6D64943ED275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1975B29A-42E5-4DB8-928C-F8F775DAA3E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"075CD42D-070A-49BA-90D9-E7925BB41A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746DDC61-3981-4E93-A7EE-C120E0265485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC88CC5-CF58-48A3-AFB6-FD38E5F40845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4628FDA0-4260-4493-92C9-4574E5EC06A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9FA064A-6E1A-4415-84D4-1A33FF667011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE896909-F8C3-4723-B5E7-9FB5FA2B73B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E03EE34-C398-43B4-A529-BE7BAFA4B3C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21147732-FA22-4728-B5F2-D115B78A8EDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D717498-4DF9-4D15-A25B-D777FF460E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B40548F-3914-4227-9E4C-F1B34071C069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE49281-0571-49F7-95FF-68B1ACA07537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B09B72E-6862-4115-9A0B-574089A94289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC38B64C-E246-467F-A185-669497DEA839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBB42063-9DB5-42DB-825A-53C6DBB51A57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E5C90EE-A9C0-461C-9E89-732BFA9BD066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972EC35D-B727-49A0-A0F1-654FD4E9576C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E74B6350-C2F8-4786-8E32-2ED6C188A5E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E26473-A8EF-44C5-B550-5E0B86D31291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663FE3CE-FA09-46A2-9C0D-2797D9137A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86309E93-F2C9-4334-9A1C-989EFDC99215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"761D49D6-0624-41CE-829E-49E7EA679EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65318A70-40FF-4BE8-962B-DFCD5C476166\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552C1E7A-2FFA-49BC-BF09-F0DE9B0C7502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"869CEAF7-59D6-4651-8D89-0244D6C430A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"059FBAA6-3127-4DF9-99AD-AA3A16317B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E0E376F-64E1-4632-9A8E-11DC99FB245F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF440B52-C6AE-4608-BE71-01B354D37BEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"243BEF5E-F693-450E-B274-FD7CF34B6771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7918C59-1678-4F24-A7C2-68824D1B59A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE72804E-600D-47FA-B3BF-36BD3CF13A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAD14B6D-CA11-41C1-9382-70CF1F5B4C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5B9BAF-59BA-4282-B387-489264D44429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"969A5BAA-19D5-4411-BABB-FE55DBA7C7D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54B41182-7AA8-49D1-BAC3-EAF312E43553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E11BBB83-147B-4FBF-B263-77FCCFB2D92D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E84677D-793D-44C5-80E9-FC29C3183278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E70E5B1F-E72C-4DAB-B6FA-977EF04BFBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECFA2358-6B79-472D-9092-FF99DC3DF042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C26842-FF50-436F-8DB6-15A70082CD1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9384B48D-0F62-4042-BE8F-9A8F5FE9A3D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A31301-AAB0-4744-98B2-695D88798D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CEB27CF-46B5-4780-964C-C31193614B74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F1094F9-7222-4DE0-A368-7421ABA66E3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C7EA2BB-A52A-438C-8EB5-CD283CACBACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"574FFD6F-D56C-41DB-A978-E501BA3CA5D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E5674D-D1D3-4597-8105-F787465E00A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11790F38-3720-45CF-9FD4-A8E5867684D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00462296-DF61-4438-818D-C240BFFCCD71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE2282B-6693-4E4B-8662-501EBC14CD9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD345EA-D5E8-420B-98D0-92674BEBEEED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56365432-1E57-4D35-B764-DDDA878B96ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"390755B3-30B7-4086-8FB2-A41614F747D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A925BA5C-AB2F-4B73-BA93-55664A319CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E748F5-FA9B-4627-AB30-5414A2952ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0668C45B-9D25-424B-B876-C1721BFFE5DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2928F8-6C6B-4C3F-BBE7-EAE8A0C47E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BC51475-7819-4C46-AF3C-251520C3EEFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)ja5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5538B7E-6AB4-4DB5-920F-EC2BA61DF73A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8011951-B642-4706-8936-74DCB59304C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)jk1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"042B6178-F186-40F3-A1AB-51AEAFCB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19940BFF-0888-4717-AC5F-87A85BE165A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)t8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C4D3D1-5E63-4A1E-BF9B-588FFE5790B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xa4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D94D6CD6-3AF5-4CC6-991D-3D8C229A1C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xa5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60704633-BFAB-486F-A613-A806733E9AB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E5A2A58-D7B2-4018-BAAE-D6CB49A3A709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C268494-F83A-488D-AEE6-AF7D319B6F64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"484207D7-0AC2-48B6-B86F-182651B6BBB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC53452-31E6-4C9D-88DF-4AD17609DBFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xe3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF6C6D9-A2BD-469E-AA75-18C063A435D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(2\\\\)xe4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE48276-21BF-4275-8512-4C5401423064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(3e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40DD5508-B8BF-435C-B316-42FEDDDBA859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(3h\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114B5329-6A76-4BE9-AA57-3463D614D495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(3i\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDC06EA9-D4D9-42EE-8A98-598356707894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)eo1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FF2F9E9-AA00-4A78-A32C-14CAA1C171A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DEA47B2-B51E-4C9C-A9C7-DFC680B32986\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2530834-81C3-4524-A4F0-B4F77DBAEB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68BCC003-3F88-4369-A387-6B8D0FDFBE32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DD45AA0-EEE1-43FF-B04D-4063769D71AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7873D1DB-80D0-4076-8716-7618D7161EE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF292613-B9BC-4CF1-A6FA-4AFC077D8632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208EF5CB-8131-443A-928B-391104DC1C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)t8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3115134B-46F9-40F0-9ABD-3F35EE635EA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)tpc11a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B810AFB-3555-4882-B12B-9DA52AD37AC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B1AF9D-106A-43CB-972C-5E85ADFC355D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C6BBA6-8D45-4BA7-B88E-44D9ECE88009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D460AE-3B86-4178-A9D4-172AD4AF1DF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xe4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552EB570-BFD6-4BBE-805B-41A9A5AE35B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DFEF95-E48F-4586-9D70-89C192FD21E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E1EA17-0717-4715-9F2E-48264E18885B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xg4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACA1E35-3681-4E2C-BAB2-DAD99F24F8DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xg5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB85916-14A8-4D16-8BE0-D99B8E5B020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BC5ED4F-1905-4EAA-8AFF-BC50B879725C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F672CDF2-ACC2-485E-89C6-42E47974C8C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xk1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C47064-BDD5-4EE7-BAB1-E8FE21EB7DE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xk3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC204B9A-1C01-4900-B515-5796B0B06E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xk4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A06F5D-ADA4-44C6-84EA-7229428B7AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67151B56-DD5F-4384-9651-FA927CE73D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(4\\\\)xq1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"111C62A4-9DF0-4317-9F95-0112BE24D727\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF0189B-964F-46EC-BE5F-8076CFE7AB8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5\\\\)b1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691E3441-AF70-4959-BBA0-60F5328F8FF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53430E70-FBAD-42F7-8614-7AB04E566810\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5a\\\\)b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B670057C-7A86-4F61-8FF5-88E6BFE2B5F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5a\\\\)b2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FC9F410-782A-416C-9E10-AF43D5BD44FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5a\\\\)b5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27107AB2-87AB-4909-9F6D-352BA94F8032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4403BFFB-8A89-4512-8030-5DEDC0C0FF93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE38549C-107E-4350-90F2-BA928E3872AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7601422B-1C22-44D2-A398-1586814A9F7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(5f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40B9FEE8-FFBB-46E6-A1EA-A243A0073853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9B4FE3-7A03-430F-AE68-743559D74DEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(6a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5C4FD2-E4BC-447D-8B3B-0248BFBE9121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(6d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67BBFB86-2745-4817-9516-50CB08AAA82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(6e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F645CEE-083C-412E-BCEF-2761AC266CD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(6f\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5CCD5B9-0771-47B3-A280-6566A489A5AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56529125-65D8-4900-A741-0AE18852B7A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF14EE4-1D49-4E1B-9589-2F3A8BF3E3E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)jx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3029C050-D02D-4DA3-B8B9-901F808BBDD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BEADF66-3434-41E0-9527-4D97F1836A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C82EB5-8397-4C0D-8074-7B55D83708B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)t8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6735142-065C-4AA2-B78A-FCD7CA8CB50F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)t9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"337C0195-34F6-4683-A944-2F698A677476\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)t10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75901574-5BDD-4388-96F9-A2B4E9970F77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)t12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBCC011-54AB-4E8E-BC20-68E6F274D323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)xi3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD0A3B5B-4E6B-437A-B355-D9DCDF078201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)xi4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"689D066C-972F-4868-A6A3-2F5522489D89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)xi7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63CA13FE-93EF-414A-A8D5-333D4A5B9320\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)xr3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B19F9376-BE29-4F08-B86F-E1634FF750F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)xr4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68DC1732-CED8-4FA6-9A75-000BABBEA5C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7\\\\)xr6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"570AF3F9-D3F5-44B1-82A1-3C7966A27BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(7.7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5719F49C-0BCC-40F9-825A-4C3C9D4D2239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4701FFB8-6361-4B0F-B413-2649A6FC650E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80CC4D9F-F7C1-4887-BDC6-62F4BDFE5079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21932884-D10B-4C2D-99C5-ED4DE3DA38E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)t7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC4C56D7-435E-4AE3-BAE8-96A6EAB57488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)t8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C44A3B72-EFF5-460D-8EE0-13782AAFDB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)t9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378FFEBE-3815-4293-943E-86771AB6D63D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)t11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB99DAF-0BF1-43FE-8263-AF8F5EEA7D59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)xu2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B78D2BD4-CD3F-40D2-8F0F-FC765A9B1ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)xy4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66A1B2C-D653-4275-ADC5-6298A70C939D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)xy5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76DFDE5D-231C-4B79-85CF-2B2097E12437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)xy6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6F2B19-7FF1-45E7-91B6-A427343099DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)ya1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64F0AD5B-4C2D-4C9D-8207-0A67F9AF995A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91192EA-0320-43D1-8D73-FAD57CC18259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC57A97-0A3C-466F-AA15-5D97AC528503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581D9245-944E-4464-924B-6CB1E874FFEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE205377-1B09-4498-8538-F2B7DF91E579\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADBBB1FA-5FA9-4042-AE12-F39307C27F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8108DEF0-102A-452B-9B94-D5AAA3918322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4666469-0A0F-4D28-8A1E-39D82ED210CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61130D36-B1EF-41F1-AF14-57475BE25FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yi1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAD8A9BF-F084-447C-B28C-2736E8C3A83D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(8\\\\)yi3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A515A997-5922-4C07-9C68-0D071E811F2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21837255-F23B-488A-A9FB-ED984020147D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(9a\\\\)bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51F92965-6498-40EC-8AF7-D31466F973A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(9a\\\\)bc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9417A9B3-CAD8-4E69-9871-484DED263683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(9a\\\\)bc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39601936-034D-4F48-9F02-0F0E251E34F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(9a\\\\)bc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3761893-292D-41E8-9800-C888B235E6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(9d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57EE4026-2A06-4E63-924C-43E663EA47DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(9e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF8B6B9-3023-4C33-AFB1-C8C4E1504178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697C9EFC-7B70-438F-A418-AEFA22841655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(10c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FF6B0F5-0E61-4ECC-B329-80ABCAED3057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(10d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19F6275E-146F-4B70-B14C-D857DDA13819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(10e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F590204-33CC-4A6A-9C37-380ADC15813A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDCFFDE0-284E-4107-98DA-C30724E4BF82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE4F50FF-2A42-4BE6-84D8-C6C2A5938125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B48ACEA8-6E12-40CF-868B-DE343BEBFE41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)t5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71775098-8BA1-442F-9709-0BCE255DD773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)t6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8355DB7C-2E2C-4108-BD0F-361B0B898D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)t8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80E065F-ABB5-4824-9C59-A53690B0CD1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)t9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A4E3DC5-0F83-42DE-9482-92DB413DCDE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C63FEE13-5E2A-4011-B720-63EFAFF55049\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)xl3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81FACB05-B13D-494E-8AA3-5590391E6F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E27655-2889-4B2A-9C48-ADD48ED5B365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yf2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F58FC83-C321-4A9F-8EE2-1531B73E064C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yf3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C7D8166-6522-437F-AEDE-2AC02913FC87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yf4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B805F909-5650-4884-9990-F3776DF203AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C705B7F5-2BE4-45F9-8B5F-9FAC900FF6D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5610D63-0E50-4AB3-A6F7-36BCF7F69EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yk1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F5092A-473E-4356-9EFB-9E3EBFCD5F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yk2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF310185-68F5-48BB-8E11-E38E1961B380\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19E24302-D04B-45D1-AC6A-0CE45F9B9F71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"723B58EA-9686-425C-99DD-FBECDF6E2225\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3EA745A-8AFE-4461-AB53-1FC71E080BC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E109B3D5-90BB-45B6-8265-B32465AC85E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)ys1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C441F423-86ED-49DF-8BFC-3CA988C9177A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(11\\\\)yw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68D39082-D9B4-4AD2-BA93-D688E098F037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4F0BFAB-D26C-4D17-B5AB-647780423E8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(12b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E59A3B6E-59F6-47B1-BC28-C0B171F1E1F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(12e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3FBFC2-0628-4A56-A96C-904807E85B49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B69920A-6775-4D3B-81A8-F971875C43D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(13a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4093FE1B-3B95-4F25-AAF5-329FEBE0F0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(13a\\\\)bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9411EF8-54EF-49CB-BA09-3AE1133D3146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(13a\\\\)bc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71AA815E-CD4A-44D5-A772-93CB340E7998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(13b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31AB99B6-84C5-426A-A037-5022FD00E6C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32302AE-54E2-423A-A418-6C7EAE2CDF0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F616AE0-42B4-403B-B610-99DE15EE490D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)t5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A83281-667D-4D1A-9F76-CFF3E5AD560F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)ym4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40FD8309-111A-45BC-819A-99FE9E002ACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42C7F308-DB1C-4500-81E4-9E3325D58A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yq1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD9C9A9-9B90-479A-9D2D-8681056892AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yq3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19661048-2B60-437E-9D56-9189BFC4C8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yq4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF870144-DFCD-4ADC-A695-3DF9266890EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D389A57A-005E-40B1-8DFC-3347F67F19F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yt1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7CEBAF-65BB-4A89-8C3B-CEF1052D99E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B311DEA-F602-49DA-8208-353D2D33283F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(14\\\\)yu1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A14407B6-FEC1-4FD8-8359-CA3EC5477B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(15\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD190476-DC7A-4033-9149-062D75704AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(15b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4510B95-F9F7-4407-B00F-F91B352C99C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E236CDE4-3369-4CDF-B0F0-4888610CCFC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"292F6F99-19B3-4106-A432-5DE916CCDD56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40183EF8-BD19-49AD-9E55-7FCCA635327F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8E40D5D-F46E-4098-A46A-1A52A343310D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550709E5-9302-4FCB-A969-2DA54BCB2184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D73E5138-016A-48EC-A367-3D3285AAFED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C114F1A6-5DFE-408F-B83A-E8B9D4AF9791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD5C082-9730-466D-A4A8-E4EEE5F3730D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF419BD-8474-4F33-9CDD-587E341ABA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"332B0446-4D8B-414B-B572-84B45D5643AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40FB896-E20C-46B1-BF59-FBB42295F9C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C3B413-76F7-413B-A51F-29834F9DE722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9F12741-69FB-46DD-A670-8461492B338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC2D158-6174-4AE8-83DA-125B072B6980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5688D88-A550-43EB-8854-2E132EC71156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8218E2D3-4F1E-440F-A2B2-A68D4692BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E3044F-3CE8-4970-9A7F-FDF555F622A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA212293-7BAF-4AD9-BD30-E953CBA7CB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF3B2A9-027B-4141-B0FB-D31A2C918CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1018E04C-5575-4D1A-B482-D1CDB9AD6A50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68FC4904-1F4D-4E10-AF95-911B07827598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB57AAA9-4715-468F-A734-A12209A6069F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480D480A-80A3-4113-A1A6-194A8DD47F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B9E611-3F06-424C-96EF-EE4997C70AB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98FE195E-084B-4F4C-800D-850165DED48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A310F30-F94D-4A70-94BD-6B94D7B5F5B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB74F350-37F8-48DF-924E-415E51932163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72732395-1B82-4E4F-9D63-D1CA0C6BD929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E618BF54-56DC-40FC-A515-3BFB4366F823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1976E53-85A6-494F-B8AC-847E7988850C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A668D08-14C4-4438-A59C-CE60498BEF8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320C5597-68BE-4899-9EBB-9B4DEE8EA7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56032FBD-FEE7-4B38-B35E-CD277B931DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CF930C-6871-4BCB-8605-B71F82455123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520304A4-EB15-42A8-A402-8251A4D2076D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80A9B6F-A5D8-403C-9018-0E627FBC9A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C46B66D6-1BF1-4DCA-868F-BADE3CB96063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA88C064-898F-4C0D-A266-D7B3509C28A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"139B1182-61A3-4F3D-9E29-758F27917646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC3706F-B00A-405E-917E-7FD5217E0501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF4D0E3-8015-4D6F-8364-B6EEAAE67971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2BCA9F-5D56-4EF4-8675-7B76129B994B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595DCBA-E6F2-4551-A804-4DBB137F076B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09698AAF-F4D1-41EE-A960-38FAB645B5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6DF12B-2A20-4AC5-8EC5-729008D87736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B75FC35-2B4D-4CEE-BE71-D497DF787123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AB8F07-AF43-4202-9908-F9A1DF6FFC03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8711A47-ABD5-40ED-847A-8D1663E3D819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2958873B-A0AB-4EAF-A5CF-8423739FAB07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1938D118-C07F-4BEC-8030-947F099BFCB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4D8C72-E7BB-40BF-9AE5-622794D63E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B65738-134F-4C1A-916B-D6CD6365CB43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5331586-8380-4F77-8735-17EC0D0E503A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(1c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)mr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35536E91-A58D-40F7-A256-34128E64B920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F69329B-4D37-428E-B467-E3B9314A4D61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9615B275-5748-46CC-8A77-4A9550A39050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421CD923-6282-4404-A642-C04E1F57F12F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD4411CB-5EE9-455C-AE90-1770320EFD86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"593D1680-4883-43FE-A925-B87ED1D2E785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(2\\\\)xb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90769378-BBD1-48D0-921C-A79413B99CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6DF704-8CC8-42C3-83F1-4D38734DEAEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E636DC68-59FE-4BA0-BCFC-4DA97EE17B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0D6801-E9A8-416B-830B-7682A9AF65BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23265E4D-855C-4CCC-A875-DFCBA55B3CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EB86291-EB40-4CFD-A424-898EFB3D518B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10AADAC-4687-4308-8E4F-B7F9549556DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(4\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A747987-5218-4C1E-87C4-0675CD4F7A2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B6483CB-7838-45F7-AE28-824AD71172A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(5b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04759B1E-8B40-460F-B33F-4E6332CFC31D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(6\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08AF3694-9686-444B-8D92-E41D262F74E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(6\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5595E7D-3CFD-4FF2-A6BE-59645058C54F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4235428-5E2E-4BCB-98B7-8844B19C7AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(7a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1E17AB-F645-4636-9337-3158556E85A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86150D11-94D7-43F9-9D19-33778558255F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(9\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDC43701-8A3A-42FB-B4F5-566DE59E542E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB2B390-A39F-4082-BBCB-712BDD95886D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2222EED-6CB2-4D18-8AF5-FAE55BC6213F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7414D32-88A1-416E-A717-3F47B6D1BE74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370DC543-AC01-4B91-88C7-60C323E35929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAD7398-D1B2-47FB-952D-8C3162D5A363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99235FFB-4439-40B2-ADBD-B08E5DBBCCB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1797E4E-E15C-4148-9B3D-4FF6D1D815AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544BD924-2CBD-4130-BBD3-5AD084C85FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B78181E-E1D1-4C25-85DE-CA46BBF21765\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1CD80F-E898-41CE-8A86-28C2F48B928A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF610051-1638-4C1B-9864-11E34EFC4DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78260223-50C0-48F8-9A65-AE67489E602C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E39462-4CEE-4C29-8B60-50E05FCF3E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FF16123-CCA0-4ECD-9B8C-AC1534C3F244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7454AF-7610-4CD3-BD2B-95A6C3283811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB633E6C-025C-4B31-ABE7-8318C813376B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFED1FFB-899D-4A48-9CCA-0B8737AE1408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"883FA166-2973-42BA-842D-28FBDBFEAC4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4362045B-7065-4FF9-A977-B3DA7894F831\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dragonflybsd:dragonflybsd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A17AD004-E2E0-4AC1-87E8-69B9C4AEBC9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFBE8937-E1BD-4601-AF1C-6DD20BB132AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D676C769-17D1-48B2-98F4-AC3BDF2C882B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEBD3CB7-D88A-4868-A6AD-0717A8A989EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C79071BA-D3FB-4FDF-96A1-477BA88C3E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2AEFCC-A2F6-45A6-A2EF-24F7906E44E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:0.4_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A37C19D-B29E-44B3-8DEF-FA32D0B01F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44EFD22E-02C9-4B80-8934-A9AC8DD858CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B4D4A5-25EB-48FE-BDFD-A274CE802648\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11DD743-A21D-48F4-BD55-A8A4FA960F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C496B665-70DA-4B98-A5D1-E2935C0CE840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A037F1-98AD-47CC-8D83-B42666E1B61E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"973B0545-D595-4A82-A147-0AB28FE32E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63236405-1F33-43DD-ACF7-B6D9656E0987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34797660-41F5-4358-B70F-2A40DE48F182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B3A2EBB-0359-49A7-B7F9-56EE6FD85D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27C9E23D-AB82-4AE1-873E-C5493BB96AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4054D69F-596F-4EB4-BE9A-E2478343F55A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA26ABBE-9973-45FA-9E9B-82170B751219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7891202C-62AF-4590-9E5F-3514FDA2B38E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4F7002-A525-4A66-BE8B-E50ABBF144B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8F9B2F-E898-4F87-A245-32A41748587B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183667CA-6DF1-4BFB-AE32-9ABF55B7283A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1156954-25AD-45BE-AE49-9705ECD5BDA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBDDEC3F-52EB-4E1E-84C4-B472600059EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314BA420-4C74-4060-8ACE-D7A7C041CF2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EAD7613-A5B3-4621-B981-290C7C6B8BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ED84E66-CFD9-4DF8-9679-13457D340D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE38C50A-81FE-412E-9717-3672FAE6A6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"263F3734-7076-4EA8-B4C0-F37CFC4E979E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0419DD66-FF66-48BC-AD3B-F6AFD0551E36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B982342C-1981-4C55-8044-AFE4D87623DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E02BE6-4800-4940-B269-385B66AC5077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A585A1-FF82-418F-90F8-072458DB7816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE31DFF8-06AB-489D-A0C5-509C090283B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF49BF03-C25E-4737-84D5-892895C86C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"200000B9-E825-4986-B38F-5D45D34603F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"682CCB34-E6CD-42C5-A7A1-D5645BFAA189\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D830933B-BD2B-482A-982C-088AF2F3A953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CFCF96-C2E7-4039-AD7C-06DC79FA2C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3EE7C5E-3B50-474B-A63B-1649CB798109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6.1:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"465C3783-F2CD-4BD2-9DBC-161B4683EA37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6.1:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E04379-047A-4E0D-B74F-73B5C582EE26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6.1:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8950112-B547-494B-BAC1-0B81F165034C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6.1:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD67FB47-726D-41A6-9D80-07848996FCB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AB4AD26-6AF2-4F3A-B602-F231FAABA73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86C77AB-B8FF-4376-9B4E-C88417396F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5364B2C0-677F-4F24-A9CD-D194CCC5C185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4470322-D617-4901-A062-C5E7DF124ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30609E89-EA47-415F-BFF3-CC7065F0EA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"48403EA5-779A-47F3-9341-A9516F06E0F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EAEA17-033A-4A50-8E39-D61154876D2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FFD9D1C-A459-47AD-BC62-15631417A32F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582B9BF3-5BF1-44A3-A580-62F2D44FDD34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61EBA52A-2D8B-4FB5-866E-AE67CE1842E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EE93350-92E6-4F5C-A14C-9993CFFDBCD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7C441E-444B-4DF5-8491-86805C70FB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAD73CDB-94C5-4DBF-8B4C-DD3E4E399445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A80E6A-6502-4A33-83BA-7DCC606D79AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD85B1ED-1473-4C22-9E1E-53F07CF517E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7752D43D-64AF-474F-BFBB-2625A29C1B88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2C79D5-D27F-4B08-A8DF-3E3AAF4E16A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4416CBA-76B9-4051-B015-F1BE89517309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9118B602-3FB6-4701-AC09-763DD48334BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F702C46F-CA02-4FA2-B7D6-C61C2C095679\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E0A416-733A-4616-AE08-150D67FCEA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"803EFA9F-B7CB-4511-B1C1-381170CA9A23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE246DE-641C-44A3-9FCC-5131655DBC1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1C3260-28D8-47C8-AB61-E2EA4ED2B1C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6909B816-6778-48A8-A828-CA0AC5484388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B988FF88-E782-4581-9E24-CDE7E1734258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F9C11B5-5D63-4D2B-AD9A-5E657A8E1D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24BEDA8-2D1D-4AA1-8806-02838FB4C323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAAF0A4-F1B1-4597-B9C1-E7F277061BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE95DD29-6E5F-475B-BCB3-6F756C62FA16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A5A944-8CFC-40ED-96D1-842ECA7316B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5BF38E2-7353-4A55-ABA3-84085BB5F8CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C5C94F0-2390-4AF3-BE18-D00B10A67052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E18C6032-012A-4B09-8D16-680CA3080D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"134ED367-9610-485D-8935-3C46BFC073AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C150050C-6C08-4434-848D-EB71741DF29E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D41FAC-B0CD-48DE-AA43-27487FF9E424\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC9CC013-D4FB-4EC0-B405-6B79DF7C2F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"235B7E7D-3785-408A-AE53-7EB4F88F06C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A12556-5E7D-4832-A71A-66E6E9C2A710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9B296A-126A-42E3-B3DD-158F895A48EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACC75E5B-48A5-4C28-88B2-870C62DDA337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3D2EFF1-78E4-4002-8904-9DA13D7D1DF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E02E89-832D-44D9-B2EE-1C070E99AE9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B55CD0D-0117-48F3-8643-4C191716AE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62BA4C24-FD29-421C-8F01-1798764C53F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"726B962B-D8B6-419E-BC0D-3DD9821234F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"985C2754-56B1-4638-B51E-313F7B8BA65F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746D0402-66BD-4225-B847-6762BC4DC18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E657F58A-440D-40CB-97BF-ACB72AB36A3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF5E6A99-20FD-456C-A5E2-FEBA5DD672ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7699FD2E-C211-4E7E-BCA5-B991FBA90EDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93B921F-B152-49F3-9AAD-9421F5867F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46381F67-EC99-4EA7-9599-BD4A25827E9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29AC849E-7D4E-4C00-8BD0-672F413A80B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6996F1F1-5374-4BD2-B421-ABB15C7C0B49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E18AFD-5090-4C1F-A2EE-A32A28DB5182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC91B71A-2456-4410-9633-CF5870027D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92555500-16EB-4F76-B2C7-61A00A1AC722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03D22C9-94C6-4AC5-AAD0-15F06BCC5CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"541B4ED8-E970-4C67-B5AF-7DE5B7F754D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E55F8A8-1ABD-4760-9074-353BBAEE005B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F873503F-C6E2-4AC2-859E-9431FE0FA0A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39E849AC-B85A-4C4F-878B-E95A5F661E1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E4A2912-12AC-4DF1-8023-A0B7DBE9A866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15004105-9A55-4592-96D6-3FF539EC7513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.1.132:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E07DB8F-0BCF-4378-9BB5-CC948E09D37D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146F7A77-A950-4CAD-BDA9-C239696F569D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7A6B55-2F3B-422E-B1F2-80B482FE89AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70DCE8FF-40C3-44F7-8185-0422ADDA051B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAC3A7C-2092-46D4-908B-CF03F4217112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956B7F2F-DE46-492F-ACA3-BD5EE7EA14F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE77B8D6-EF2A-4EC2-AF75-B6FA48747781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAEC8651-9291-4CAE-AA49-C1CA4C7AE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6F3945-21ED-44C6-86D2-B7755A87014E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4919EB3-625C-4D83-8DCB-72BCF05DF2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DDB008-E88E-473C-B030-AF9B6F5E4E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E48C9A9-B7E6-4314-BCEF-8013BBB4276E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEF4480-D50B-464C-AE39-A12455DBC99F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15928E10-7D41-45B2-87D6-8AA10190A8EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18E13C4-F42D-4168-B25E-544E1549C46B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4947CDE-CB89-456B-8B5F-0E17B46BC893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF701E58-35E8-4DDE-B832-C5A23E61A3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C122CC4-B8CB-4AB9-8571-6F3D302F56A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2498D898-D243-4D0C-9AEF-0138D19A68B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3924060B-1EC1-4003-B306-E327634E7797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45B43DF-FD4C-4C37-9569-1CCE450B8987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99879B2B-7FFB-4181-8928-13B7E17F36C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83A3E250-5BC6-4AD3-A3DE-7F876FD90BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6126B84-9D78-48AF-B5A3-B89F9B1D42DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F9DBB0-8AF7-42CA-95DD-68A344E9D549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC74D465-3256-4D87-8F47-C4D7CEA6E2D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A58614-0522-48B1-9DF2-20001A37A936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C37E17F7-A276-4A33-B454-751BF639EF9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97FBF069-C751-4F18-806A-DF8C809AE464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F7DACF-2AAB-4D9E-8F62-F2B10B39974D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE1FA10-5512-4147-8E5F-EAAAFE334B31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94433CD6-B625-494C-A85A-330D0774D198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1565B9E4-02DF-4725-9D31-189B4D3D840D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1303C9DC-CD79-40B8-AF0B-8F90FA942106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00530A0F-E726-4F52-BF0E-CE7203AE3A81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"329B6CD3-7B84-4718-9436-5F8A1AAA60ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB796B30-701B-4D5A-BF4B-C5CD81A48417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB8FF20C-82B0-42D7-92AB-B4C45651B955\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E97F35A6-11F9-43D3-AD53-23351865F7C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C10A1DB7-A847-43FA-92E6-4B2941DBECAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FEEF97A-83E8-4CEE-8913-2D25E0E8AF6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE443A39-5E8B-4303-9BE9-C3D934F06A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7258601-9481-4B43-A63D-825DB39ED51A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24F31744-8A55-48A6-B934-18EBD9657FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9FD388-E804-41D1-B051-588C03ED83D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6ECC079-EBD4-4E01-9CAC-A4FC84F79656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249C1EEB-F267-44F2-B4D9-AEFA9E578FDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E575B550-E957-4F68-A9FA-3EF4022028A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"256328E7-3F4E-49A3-9F66-6DAC1F7BE941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E3CFEB-CF89-4697-9D3C-C1D41F5B803B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F7C571-2713-402F-82CD-66B5C8A50319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D582D69B-65A9-4906-9FF3-1EC7AD2AF927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4E4BAD-E286-4F24-A786-B3DC281537B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"293E5303-3BC2-4A01-99EE-F519E17F2CF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73D6DAAF-6D2C-4D33-9109-BC112170762F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7337DB6A-72E4-4F7C-8AA5-8EC546B632AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C655702-571C-481B-807C-9FE390B52159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48C775C8-DB4A-4D58-B573-2A8D612E26ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61787316-0408-477D-937E-14596C215EFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC9628D9-86C8-4200-B605-1D00C7DF9257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96BBA71E-5517-400E-A82E-ECE165C78583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C70A57A6-6633-459A-8AB5-DC009D407108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2FCF983-1BD5-423D-A3A3-EAAA28BA4146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04BF2B3C-7267-4C58-9CD8-270C27B5142F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9152FDC9-A97F-455C-83EB-5070C7B32AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"340F5E67-8F70-4374-BF9A-0AA425A4A5A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430E39C3-0E40-42C6-9839-982610D97EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0F96C09-D870-4DE7-A8D1-803D7071126D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEED38F2-9FC3-44E5-A4A9-D5573C6CAE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DAA6363-569D-4234-B784-A357C59C2ED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7463B1BB-551E-4D0D-8FB0-6BE2D61DFA6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72CB2A8-18C3-4890-B03A-3FCD8638F857\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B60B7E-619E-4844-BBAB-AB8F9D8CF430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40D99B33-99AC-4AD9-A599-270CC82744D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3983BAF0-C2E1-440B-9A03-880DE197CAAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CAAF6CF-148D-4328-9C08-5A18CEF6B71F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0EF7B9C-46AF-4AD3-B940-9C631ED7A704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4817429F-B24F-47E3-BB3B-7EF9036D5F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E120257D-346B-4BA6-A431-E6F820FBB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"361D407D-A4BE-491D-BC8E-32E78DC4A8F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CD7983-4EB2-4D17-9332-493ECBADC284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550DFE6E-DCE6-4649-8746-522996021DBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E17BB496-749A-40C8-BAA9-6CFBBE308065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C30F255-1297-46EA-9FBC-05564792FF65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934CBC22-864C-468F-B267-3CDE4449DA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC432E3-7214-4B61-A666-2DAF5CCAEC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7682650A-8332-484D-874F-2B67246880B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFF499A-6602-4BD3-90B5-E6C4AC888812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C406D55-D6CF-443B-B5DB-FC69FBEA01D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C53EDB2-923D-4860-8251-9A07C9F8FDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E2A5D6B-7011-40AE-8A94-02B062B19010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E460A86-FD22-4023-A0D7-0D2F43131635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFCA2ED-2384-4DB7-9634-AEAEDFF57817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6F04081-D672-488E-A91D-5088DD04AA5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BDB59EF-74EF-462E-BC84-89201F734380\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0755A136-3DE3-4B61-B5EF-F6282AACD38E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1531AD3-2525-4F6E-B77D-FE8863CBD3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D950C3-0DDC-4549-99F8-1E206768219A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7E2A5B-6CF3-4748-BE4F-F63A4E59CB64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"195A133A-26C9-401E-913F-285BA220D1D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D68E21-6C58-46A7-96F2-9A79DD880803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E975B63-3D9C-4FA9-A6D0-C9865FDA7AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38D11B12-AFD7-4055-A366-D932CA1BA8C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC990132-9DF2-4D23-B9DA-0819809A3CAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFA51D40-E72C-40A4-B238-70F6806FA1B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1B7D68-E41E-4A5A-9606-F14F057B39E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7799A9CE-1948-4D71-BADB-A4A7ECAFF5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70BCB10C-FD72-4F18-84C9-AE0603402426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54A74CAB-2BD1-48BC-BCEB-983E72B3C56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF742FF1-5504-41BB-8FAA-D71B83C791B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"901C6D04-3226-4654-9A41-0325B48A2F7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"072A77AD-BB27-4C24-91A0-A12D6E741593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF900D1D-E351-4407-8269-80E5403432B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44915F9F-88DF-4304-8F66-58A869654BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CC2D90D-2115-406C-B609-870B241F00B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF681CC1-B3EC-467A-A10D-10840D3D4575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8660C030-328E-4221-847E-AC4BDA08CE79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE83E4E-DBA6-47EB-80FF-9A41A2978DDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B58DE3A3-2BE0-45E3-8EFD-5A4439EAD6DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47AEC277-F9A4-412F-B2EA-C1AEA336A46C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7234AF29-BCDA-4728-A141-C169EE59CEC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7D9064F-466F-4D66-AD5E-8BC2D31CD80D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"374851C5-C61D-4964-8B4A-473B0A008F11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD55C81-3687-46BF-880E-58D7E005A185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2953267F-16BF-404F-83F1-73E0908979B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D953B61-3457-4A0E-A668-BA4937B79784\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F5F3607-C0DD-494C-AB6E-46E383A6B17D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19138F52-25EA-42B6-89DC-692A8AF0A720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2EBADC-0817-4E38-9F49-8446D8A20CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"340368E7-0005-4F8A-8AF1-C20A1198288C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC860DD-57DF-4474-AE2B-9AADB9060175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC1D576A-0763-4611-B3CF-CD8514F18783\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A61F3C5-EA3A-4AA2-8F4E-02E07864801F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F570226-CA89-46F4-8C68-9A59BC0602A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"162A88DA-E2EA-4E92-B174-9AD86BE8D983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE19B6B-9537-4C76-80B2-98DAF2C15B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE5C4F5-C64D-4714-B02E-689B435E3E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4F20D3-77E7-4FC2-AF18-6A5E3AE08615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164F4483-9F28-491A-8F99-4242C9B9CBD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34803A7D-45C4-4DBE-BF18-19CE9DE62A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1178D6EE-A462-4CC1-B430-9A44C75D2336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4360530E-6E07-48F9-B8F8-B36622331052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17508D09-AE14-4458-93A2-E2764452EA8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F2CD4A-CCA9-4743-86C4-7675D2487E16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75C1504C-03C5-49E4-8192-E1E698CF07A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB7CB4B0-1CF5-4AA7-A977-9C24AD6C486D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A3172A-E663-42F6-90E7-51C3850AF9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F6692C-494F-44ED-97C6-A6CD05334DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B61C93E-84FE-46CE-A7DD-ACFEFB96BB62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E79FB38-5AE5-4ACD-B4F5-F533C0E1D503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77231F8B-137F-4FAE-BCD9-658F32943CBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"552ED77A-F09A-4923-A907-8E0DF8445363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD8EDD0-7817-4A5E-AE97-DA1941E859BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DF940EA-676A-42C8-A6E0-7F53C8A34340\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDC8FDE8-DB5A-4B2D-810D-73E91194E00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CF7304E-AAA9-4BC3-AEF0-C9509E95ECA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DCCFB1-054F-4BF0-92F1-78A2063415D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D3222C-7469-42F6-984D-3223BCD8080E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697B7069-D08D-41BD-8285-A1ABA0E1142F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72173CFB-BAB6-456C-B5F2-3AA31D799E74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD08A67-195F-431B-98A5-42B2966055DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658C7317-D50B-475A-9E0E-E68AECD49B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1270F454-8E05-413C-BAF4-35D062CA5803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7BBB5F-44F7-467F-B934-33ABF744A107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0478831E-87B2-441F-AEC2-403A35FED1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB1A21-3826-4BC5-A243-AF8F8D1D4728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CCA5C83-5293-4107-8E6A-85F82ECF2C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2D0AADC-BC34-40FB-BD69-37981DC8E971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12547B6B-78F1-4426-81CE-5F208794658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38429E64-276B-46D4-AACD-05349D6F6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E89640F8-313B-4A36-A591-36645D1EF838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0271F0-41F2-4096-8C91-DAD1A81AF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A40DCBB-B41B-468E-A918-6EA3F9A125E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B6A54-85E3-4867-8EDF-93EB86BAFBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B004CF1-0ACC-441C-9F61-9B20504F4ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A252C50-D63A-4FC0-A51E-A63A939D6AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B914F7F-C6BD-4527-B1E9-7FD1E337A18C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A98A70-51E3-4556-8DC4-DD09CF370D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821BD11F-3C6A-4424-BC9B-DFD786248B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB759752-DC19-4750-838B-056063EFDC5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615BDD1D-36AA-4976-909B-F0F66BF1090C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A26D6-1BDA-45F0-8F7C-F95986050E32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F320FA9F-C13D-4AA3-B838-A0E5D63E6A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B179CF1D-084D-4B21-956F-E55AC6BDE026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B4877-286A-44B5-9C5C-0403F75B2BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"432CA976-6EFA-4D34-B5EA-CD772D067F93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E476195-657E-416E-BC16-44A18B06A133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFF566DA-0F04-48DA-AA40-565979C55328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140380C-71BD-464F-AE53-1814C2653056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18EC0A7-8616-4039-B98B-E1216E035B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22FB141B-FA2A-435D-8937-83FC0669CB20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59131C8-F66A-4380-9F6E-3FC14C7C8562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5421616-4BF5-4269-8996-C3D2BA6AE2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FC6CE2-8717-4558-A309-A441D322F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BE336-7BB2-47C0-AED5-3DEA706C206F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAC2E9D-0E82-4866-9046-ADD448418198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F2047A-5F17-4B59-9075-41A5DC5C1CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A12DE15-E192-4B90-ADB7-A886B3746DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6588E7-F4FA-40F5-8945-FC7B6094376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:midnightbsd:midnightbsd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F7D4E2-850E-4FAC-B447-608F1D41B686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7751B50-9C8D-45E9-93C1-FD4B27A1427B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF613C9-DC4A-45F0-BEE1-8450762B0089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"441CEF2E-9687-4930-8536-B8B83018BD28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55DD3C82-0B7D-4B25-B603-AD6C6D59239A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CBA1B13-B378-4F13-BD13-EC58F15F5C81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C8CAB1-2D8C-4875-A795-41178D48410F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C422E343-ADF2-427D-865D-B5C35431EFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C288A88-11C6-429E-A109-0395D0989264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"516C6D9A-7483-4E36-A2E0-42698161AD31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F89124-E194-4C7A-B06D-8535B4066AA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249FA642-3732-4654-88CB-3F1D19A5860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5071CA39-65B3-4AFB-8898-21819E57A084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C3F588-98DA-4F6F-A083-2B9EE534C561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C2ED81B-8DA2-46D0-AE24-C61BF8E78AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D18C95A3-15E3-41B8-AC28-ACEA57021E24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFC6B75-9057-4E58-A4D4-8AEC12AE62E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28BD9F91-2384-4557-9648-25FC00D04677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECF9E5F-AF38-42B9-8B49-6C254394CDFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CABFAA-594C-45D7-A0C7-795872A0C68A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F9432E9-AACA-4242-BDAB-8792ACF72C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29C02C6B-AAFD-4594-94A4-F26BA3648CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57C533D7-771E-4E33-A4FE-764C0B73F920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:3.99.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7C5D200-B40F-458D-8216-A3C22B21B46A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9875E709-11BA-4B8F-A2FC-26844DD4D563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41D2806B-D7B2-4982-B759-8D60866A36DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DF0D51-FCFA-46A3-B834-E80DFA91DFDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CB726CF-ADA2-4CDA-9786-1E84AC53740A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC373FC-88AC-4B6D-A289-51881ACD57F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBE290B-5EC6-4BBA-B645-294C150E417A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF053A1-C252-427E-9EEF-27240F422976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A9C344-45AA-47B9-B35A-1A62E220D9C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80EB24F0-46A7-481B-83ED-8BB012AE0C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA6AEAF0-FA61-4A3F-A083-1218C2027781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60DA30A1-3360-46BC-85B7-008D535F95BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA33E7E2-DE7B-411E-8991-718DA0988C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1957B3C0-7F25-469B-BC3F-7B09260837ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC46909F-DDFC-448B-BCDF-1EB343F96630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9496279F-AB43-4B53-81A6-87C651ABC4BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDA160D4-5CAB-44E7-880A-59DD98FEAD62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D84D7A-EB7C-4196-B8B6-7B703C8055C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEAE2873-0028-4744-B64E-8E2EA30447F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"783973F9-2A6E-4DDF-A64C-7794FFD0B7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC77812C-D84E-493E-9D21-1BA6C2129E70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C117F3-3684-4683-9F9E-CEDD5B88F9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DF8DD37-A337-4E9D-A34E-C2D561A24285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12313A0-1EAF-4652-9AB1-799171CFFEA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustedbsd:trustedbsd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30A1BB80-2569-4800-9668-ACE3978877B3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D929AA2-EE0B-4AA1-805D-69BCCA11B77F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5494A20A-5927-4249-942C-189292E5F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F422A8C-2C4E-42C8-B420-E0728037E15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A04E39A-623E-45CA-A5FC-25DAA0F275A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1AD1A1-EE20-4BCE-9EE6-84B27139811C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:catalyst_blade_switch_3020_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.2\\\\(50\\\\)\",\"matchCriteriaId\":\"DC1F6E8C-07CB-4612-9CEA-5BB1D4C691B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4EBA036-A69E-40FE-B8A2-6D99C0AB9F35\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:catalyst_blade_switch_3120_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.2\\\\(50\\\\)\",\"matchCriteriaId\":\"52B522E0-47BC-4885-9C27-D9B5F603880B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDE0913-7E59-4741-B0D9-EC6C90C5E21C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:catalyst_blade_switch_3120x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.2\\\\(50\\\\)\",\"matchCriteriaId\":\"CDD283F6-CB69-4939-80F5-9BBAD7B7823E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808DEBC5-0249-491C-9607-9263F781BCDC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"722A52CF-4C6E-44D3-90C4-D2F72A40EF58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F864AD7-53A2-4225-870F-062876CE45DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964B57CD-CB8A-4520-B358-1C93EC5EF2DC\"}]}]}],\"references\":[{\"url\":\"http://blog.robertlee.name/2008/10/conjecture-speculation.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://insecure.org/stf/tcp-dos-attack-explained.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=125856010926699&w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=125856010926699&w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.outpost24.com/news/news-2008-10-02.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-251A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://blog.robertlee.name/2008/10/conjecture-speculation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://insecure.org/stf/tcp-dos-attack-explained.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=125856010926699&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=125856010926699&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.outpost24.com/news/news-2008-10-02.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-251A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}],\"evaluatorComment\":\"Please see also:\\nhttp://blog.robertlee.name/2008/10/more-detailed-response-to-gordons-post.html\\n\\nand\\n\\nhttp://www.curbrisk.com/security-blog/robert-e-lee-discusses-tcp-denial-service-vulnerability-sc-magazine.html\\n\\n\\n\\n\\n\\n\\n\\n\\n\\n\",\"evaluatorImpact\":\"The impact of this vulnerability has yet to be determined. The full list of affected platforms is subject to change. The NVD will continue to monitor this vulnerability and adjust the configurations as needed.\",\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"The attacks reported by Outpost24 AB target the design limitations of the TCP protocol. Due to upstreams decision not to release updates, Red Hat do not plan to release updates to resolve these issues however, the effects of these attacks can be reduced via the mitigation methods as written in http://kbase.redhat.com/faq/docs/DOC-18730.\",\"lastModified\":\"2009-09-08T00:00:00\"}]}}", }, }
var-200810-0010
Vulnerability from variot
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. Part of the Transmission Control Protocol (TCP) specification (RFC 1122) allows a receiver to advertise a zero byte window, instructing the sender to maintain the connection but not send additional TCP payload data. The sender should then probe the receiver to check if the receiver is ready to accept data. Narrow interpretation of this part of the specification can create a denial-of-service vulnerability. By advertising a zero receive window and acknowledging probes, a malicious receiver can cause a sender to consume resources (TCP state, buffers, and application memory), preventing the targeted service or system from handling legitimate connections. Transmission Control Protocol (TCP) Multiple implementations of service disruption (DoS) Vulnerabilities exist. RFC793 It is prescribed by Transmission Control Protocol (TCP) Implementation of service disruption due to misuse of available resources after connection establishment (DoS) Vulnerabilities exist.Service operation disrupted by a remote third party (DoS) There is a possibility of being attacked. The core TCP/IP protocol is prone to multiple remote denial-of-service vulnerabilities. The issues are tracked by Cisco Bug IDs CSCsv04836, CSCsv07712, CSCsv66169, CSCsv02768, CSCsv08325, and CSCsv08579. These issues are reported to affect multiple vendors' implementations of the TCP/IP stack. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: Blue Coat ProxySG TCP Implementation Denial of Service Vulnerabilities
SECUNIA ADVISORY ID: SA37044
VERIFY ADVISORY: http://secunia.com/advisories/37044/
DESCRIPTION: Some vulnerabilities have been reported in Blue Coat ProxySG, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerabilities are caused due to errors in the TCP implementation when processing TCP packets. These can be exploited to exhaust system resources and render the appliance unresponsive to legitimate requests.
SOLUTION: Please consult the vendor's advisory for potential workaround information.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Outpost24.
ORIGINAL ADVISORY: https://kb.bluecoat.com/index?page=content&id=SA37
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01923093 Version: 1
HPSBMI02473 SSRT080138 rev.1 - Cisco Catalyst Blade Switch 3020/3120, Remote Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2009-11-17 Last Updated: 2009-11-17
Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential vulnerability has been identified with the Cisco Catalyst Blade Switch 3020/3021. The vulnerability could be exploited remotely to create a Denial of Service (DoS).
References: CVE-2008-4609, Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products(cisco-sa-20090908-tcp24)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Cisco Catalyst Blade Switch 3020 for c-Class BladeSystem running firmware earlier than v12.2(50) Cisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP running firmware earlier than v12.2(50)
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2008-4609 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided firmware updates to resolve this vulnerability.
Product Firmware Version
Cisco Catalyst Blade Switch 3020 for c-Class BladeSystem 12.2(50) SE1 or subsequent
Cisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP 12.2(50) SE1 or subsequent
To Locate the Firmware Update
Browse to http://www.hp.com and do the following:
Select "Support & Drivers" In Step 1 select "Download drivers and software (and firmware)" In Step 2 enter "Cisco Catalyst Blade Switch" Click on "Go" Select the desired product Select the desired Windows operating system Click on "Firmware - Blade Infrastructure"
PRODUCT SPECIFIC INFORMATION None
HISTORY Version:1 (rev.1) - 17 November 2009 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAksEDAMACgkQ4B86/C0qfVm87gCgliWdpIKldzOKHRvJA5r9gR4Z ge0AoMu3ueCbIB4y3HUmT/jReUzE4jym =uBei -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200810-0010", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ios", scope: "eq", trust: 2.1, vendor: "cisco", version: "12.2", }, { model: "ios", scope: "eq", trust: 2.1, vendor: "cisco", version: "12.4", }, { model: "ios", scope: "eq", trust: 2.1, vendor: "cisco", version: "12.3", }, { model: "ios", scope: "eq", trust: 2.1, vendor: "cisco", version: "12.0", }, { model: "ios", scope: "eq", trust: 2.1, vendor: "cisco", version: "12.1", }, { model: "solaris", scope: "eq", trust: 1.8, vendor: "oracle", version: "10", }, { model: "solaris", scope: "eq", trust: 1.8, vendor: "oracle", version: "8", }, { model: "solaris", scope: "eq", trust: 1.8, vendor: "oracle", version: "9", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.0\\(9\\)s", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.0\\(5\\)wc2b", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.2xv", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.1xx", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.1xv", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.4xv", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.3xx", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.0xv", }, { model: "catos 8.4 glx", scope: null, trust: 1.2, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 1.1, vendor: "cisco", version: "2.1", }, { model: "rtx1100", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "ios xe", scope: "eq", trust: 1.1, vendor: "cisco", version: "2.2", }, { model: "pix/asa", scope: "eq", trust: 1.1, vendor: "cisco", version: "8.1", }, { model: "rtx1500", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "rtx2000", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "rt57i", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "pix/asa", scope: "eq", trust: 1.1, vendor: "cisco", version: "8.0", }, { model: "rtv700", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "rt300i", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "pix/asa", scope: "eq", trust: 1.1, vendor: "cisco", version: "7.1", }, { model: "pix/asa", scope: "eq", trust: 1.1, vendor: "cisco", version: "7.2", }, { model: "rtx1000", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "rt250i", scope: null, trust: 1.1, vendor: "yamaha", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)s7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.42", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)sl", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xf1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)t9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8a\\)e", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(22\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxe", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.0.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5a\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)xz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zc", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(19a\\)gs6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(17\\)ct", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0db", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)st2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yf", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "2.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ewa3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xm", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.17", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ewa4", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(7\\)db1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(13\\)ca", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)db2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ea1a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xk2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(10.5\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2bc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17d\\)sxb8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(4\\)mr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7a\\)e6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xd", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.16", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.19.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3jk", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)aa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(1\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ea2c", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3bc", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.5.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xn", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xb15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc5a", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "4.3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.18", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)xb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(14\\)gs2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(30\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xy", }, { model: "windows 2000", scope: "eq", trust: 1, vendor: "microsoft", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)ex3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)xt", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)mb12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5\\)b1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(6.8\\)t1a", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.31", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.9", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.7", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "2.0.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)e4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3a\\)t7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)mr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5c\\)ex", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.36", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)mc2e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(16\\)aa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.19", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2gs", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xn", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.33.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)t1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(12\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3a\\)xi8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4sw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.2\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25.4\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)w5\\(27c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(21b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)t9", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxd4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sw", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17d\\)sxb7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12i\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ya11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ew", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "1.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)st7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sz", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.19", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.38", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxe1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.13.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yj", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.24", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(26\\)eb1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(16\\)b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1ca", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)s14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)t3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yq3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.13", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.5.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)ew4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.34", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(6f\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2wa3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(4\\)xaf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(15\\)bc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.28", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ex", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1c\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12\\)", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3na", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xt", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0wc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3bw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)mc2c", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)st6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(16\\)", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(27b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(3d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2bx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)b4", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)ys_1.2\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ewa1", }, { model: "midnightbsd", scope: "eq", trust: 1, vendor: "midnightbsd", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(3\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)st6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.29", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.36", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(1\\)ed", }, { model: "bsd", scope: "eq", trust: 1, vendor: "bsd", version: "4.4", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "3.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.36", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sc", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "2.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)eo1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.44", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15.1\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5a\\)b", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.18", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7a\\)ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zj3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(12\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12b\\)", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0w5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xe4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)ze", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)seb2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)by", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.35", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "8.2", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "4.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)e", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)eu2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(22\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(8\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(8.2\\)sa6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1sec", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.14", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.54", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ja", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12g\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ax", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yk1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xk2", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "2.0.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zl", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.43", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(24a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.60", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.53", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)by2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)sv1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)bc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(26\\)e3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.14", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.13", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "3.0.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yf2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ya1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)ym4", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "1.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)yb4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(11b\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)dx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)st5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xj", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(9\\)xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0wx", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)st1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.25", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s1", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "3.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)t4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)eo", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xp", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.65", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(30\\)s1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.30", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(26e\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)w5\\(18f\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.18", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)st1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(7a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12.02\\)s", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "3.0.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)st6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)xy4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.30", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)s10", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.25", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2sa", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.39", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12.05\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)cx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xp", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.6", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "1.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(2\\)xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.3\\(16\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)yp1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13e\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(22\\)ea6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5a\\)b2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(9a\\)bc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(15a\\)p", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "3.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(19\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(7\\)da", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7.7\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(24\\)sv1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xj", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.20", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)e8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(1b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)s9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)t12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(27\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.33.4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.1.89", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)w5\\(27\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(16\\)ia", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s5a", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.47", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(26\\)p5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zn", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)t10", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)yy3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sxe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)xb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5e\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)t4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.21.1", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.5.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)e14", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xa4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.3\\(19a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2mx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.9.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)xu2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.26", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.43", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.15", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2by", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.5", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "2.0.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(31\\)s", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.3.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.44", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.35", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ex", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxd5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yg1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.55", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.30", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(11d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)xz7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)ex", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.26", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "9.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xi", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12.05\\)t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s4a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e14", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.35", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)t15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.1\\)xp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ja1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.30", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(11a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(8\\)p", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.13", }, { model: "catalyst blade switch 3120x", scope: "lt", trust: 1, vendor: "cisco", version: "12.2\\(50\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)t10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(36\\)cc4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13.03\\)b", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)eb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(8\\)db2", }, { model: "trustedbsd", scope: "eq", trust: 1, vendor: "trustedbsd", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)st3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0da", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.22", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.33.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(23f\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.3\\(4.3\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)xl4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5a\\)e", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.31", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ya", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.3\\(3.3\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.37", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)e1", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(16\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ay", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xi1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1a\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(6a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5a\\)b5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xr", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.38", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ez", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xn", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yd2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t15", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)dc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(9.4\\)da", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)t9", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.0.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)xt3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)t1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(8.9\\)sa6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e10", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "3.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(4\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xm", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)ys1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(3a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xi2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)yc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xh2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(28a\\)ia", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yp", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.27", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3tpc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)fx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(17\\)cc", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xu2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)xp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ec2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)ja1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e13", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.1.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(17\\)bt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12.05\\)s", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.32", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zh8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "4.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4mr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)xr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)ew3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ya", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "2.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)eu1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(1a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)t8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)sp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xm", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.13", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xn", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ez2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3db", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.12", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "4.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.64", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xg5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(23\\)e4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)t5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17f\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xg", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14.6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.4", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "5.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)t2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(11\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.11", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.25", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "2.0.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(3.4\\)bp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3a\\)e8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(16\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xs1", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.21", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)s3b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17d\\)sxb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12h\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)eo1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2p", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xb", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.38", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0.12\\(a\\)bt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)b1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8.0.2\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(22\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)t4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yd", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2dd", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.1.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xc", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "1.2", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2pi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3a\\)e7", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "4.0.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ev", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bc1f", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(11b\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(6.8a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(7a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)w5\\(28a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ze", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.34", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)ys", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14.5\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2n", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3wa4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zk", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(7c\\)", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.34.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.51", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24.2\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)w5\\(22b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)za8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)jk5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yf4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.12", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.21", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)db", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(26b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(11\\)b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.2", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.1.132", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)sy1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xj", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)t3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(5\\)ca1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)ja1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(27b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yg", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.18", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14.2", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "1.1.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ea2b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ca", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(10d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(05\\)wc8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xb", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.23", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)b2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(20\\)aa4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(x\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)ea5a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)t9", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.37", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)se", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xg2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)st7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xv5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)s9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xa5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(9\\)ia", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(24\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17d\\)sxb10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)t8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1cx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3j", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.66", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)ea6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)t2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.46", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)w5-32a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)sx1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)ya1", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.19", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(7b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sw3a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xg4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e9", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "2.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xy", }, { model: "bsd", scope: "eq", trust: 1, vendor: "bsd", version: "4.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e17", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)xy6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sxb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)ew3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sv3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(9\\)", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "6.3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.20", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(22\\)sv1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xv3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yi1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)ea2b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "4.1.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(26\\)sv1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)ewa3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2x", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(8\\)sa5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)ewa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(5d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)xm4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.8.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)bc3c", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(9\\)p", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xa1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xe2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)xm2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(3h\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.24", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "2.0.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)dc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)sy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)eb", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.1", }, { model: "windows server 2003", scope: "eq", trust: 1, vendor: "microsoft", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.2\\)xu", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "6.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(24\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)xm", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(17\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(30\\)s4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3da", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.52", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zi", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.22", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sw4a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xd4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(27\\)sv1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)ja1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zg", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.47", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4.3\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(24c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xb4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(18.4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yh3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxe3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)w5\\(20\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.19", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "3.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)ex", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(16.1\\)b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)ew3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(28a\\)ct", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1m", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(16.5\\)s", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.33", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xd3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sxa", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7a\\)ey3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)ea1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)ea", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.48", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xv4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1da", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.20", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xc3", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3b", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.4.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxd1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)yd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ew", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.40", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1b\\)da1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)xb2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yr", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.27", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2f", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.1.6.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ea2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2za", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(10e\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.38", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "4.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xk3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(14\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yt1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)dc2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xb3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(7\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.52", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2su", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)db1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12a\\)", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.3.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xm", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.21.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(17\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(9\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)wt6\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)yw2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.6", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xe1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xk1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.27", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(13\\)ia", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)seb3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.13", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.32", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)s8", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.21", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "9.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ga", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)yw3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xr", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "3.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)xy5", }, { model: "dragonflybsd", scope: "eq", trust: 1, vendor: "dragonflybsd", version: "1.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3ha", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(36\\)cc2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.24", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4ja", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yn", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xn", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2tpc", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(26\\)sv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1aa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xk2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.47", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xr", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.3.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(15\\)ia", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xe3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2seb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)xr4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.4\\)wc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yc1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.48", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)w", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ez1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yd", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.23", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)w5-30b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(5\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.46", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.19", }, { model: "bsd", scope: "eq", trust: 1, vendor: "bsd", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(13\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ya8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(15\\)aa", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.17", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.67", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)jk4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.21", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zm", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.17", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xn", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xn1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sxd", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17\\)zd3", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.1.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(3d\\)", }, { model: "windows server 2008", scope: "eq", trust: 1, vendor: "microsoft", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yg3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1ia", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sw4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(23a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13.4\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(13a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)sl1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.9", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.33", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xc1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "5.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(19\\)b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.3\\(4.2\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)ea", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)sl4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.25", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(10\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "1.3.0", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xb14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6a\\)", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.6.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)jx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)za", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ym", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.49", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zl1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xm", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.45", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)xp4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)ja", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ez", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ea", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)xw1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2se", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zj", }, { model: "windows vista", scope: "eq", trust: 1, vendor: "microsoft", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)dd3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(9\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yf3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2dx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3ya", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3ma", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3aa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)w5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xd2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8a\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sv", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.6.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bc2f", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2bz", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.6.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ew4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.45", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(7\\)", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)t3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.13.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)xl3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.10", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "2.1.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bc2i", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.19.3", }, { model: "catalyst blade switch 3120", scope: "lt", trust: 1, vendor: "cisco", version: "12.2\\(50\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(9a\\)bc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(13\\)aa", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "3.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)ja", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8.3\\)sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yk2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)t7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)db2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s5a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yi3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6.5\\)ec3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "1.2.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sea", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.56", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.24", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)bx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.17", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12\\)da9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(18\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(4\\)xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(3\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)mb13b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2cy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xt", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xe2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc9a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)t4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zj1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.22", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)t14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(36\\)ca2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ex2", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "7.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xa5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(9a\\)bc7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xe", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.15", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "5.2.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)db", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.37", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)tpc11a", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.41", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yn", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.29", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2jk", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)cz3", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "4.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(9d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)ewa2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)xf5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3ye", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(23\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sv", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.59", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(20.3\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ys", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc3b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2da", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yr", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "7.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10.5\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)xi7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(8\\)sa3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)wx5\\(15a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ya10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3ym", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xm7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(31\\)s1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.62", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xb", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)se", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.28", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)t", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "4.2", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(19\\)gs0.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.49", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)ya2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(10\\)bc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(5b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xc4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)t3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.3\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ey3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3jeb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)bc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xs", }, { model: "windows xp", scope: "eq", trust: 1, vendor: "microsoft", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xz", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0wt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(15\\)ca", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)db2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)so4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xm4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.50", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.4", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.1.7.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yg2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)db1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xd1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(23\\)", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xe3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(23.6\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ye", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(30\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)su2", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "5.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xk", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.18", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1.1\\)pi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2fx", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "3.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yd6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yq1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xa", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.31", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "9.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(12b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(11c\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.58", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5c\\)e12", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.63", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sv", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.19.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(6d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3jea", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "0.4_1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.27", }, { model: "catalyst blade switch 3020", scope: "lt", trust: 1, vendor: "cisco", version: "12.2\\(50\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(6b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.4\\)t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.50", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8a\\)ew1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)ea1b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1x\\(l\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)mc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)t11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xm", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xh", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)ja5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxd6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)ja1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)t8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)sz1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xs2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)t4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)jk", }, { model: "dragonflybsd", scope: "eq", trust: 1, vendor: "dragonflybsd", version: null, }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17d\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)xi4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)e5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)t12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)ya", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)e12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xh", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.28", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.26", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xy6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.23", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)t6", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "4.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2cx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)ja", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(6c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(21\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)w5\\(31a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.12", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(10\\)da4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ec1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)w5\\(28\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zd4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.21", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(7\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2cz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "5.4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)st1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.31", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xe", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.99", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ea1a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0ev", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(7.4\\)s", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "6.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xd", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.6.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xg", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.19", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(6\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1cc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(16\\)b1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.21.3", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1eu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)ewa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(15b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)sv2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11.5\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xm", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.34", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(8\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.33", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(23a\\)bc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(10g\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(22b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)sy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)ja", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)jk1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1az", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(28\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)sz", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "5.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.39", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.24", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.9", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.33", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(3i\\)", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zn", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)t6", }, { model: "dragonflybsd", scope: "eq", trust: 1, vendor: "dragonflybsd", version: "1.10.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2pb", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(13a\\)bc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)dc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)yv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xk3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(11\\)st4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(10\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(4\\)t2", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xt3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(12\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(26\\)p2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)ea4a", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "3.99.15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)t4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)sz2", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "3.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bz", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)da1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(15b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.29", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.19.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)bc1a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)cx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(26a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(8\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(4\\)f1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.17", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)ev01", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(18\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yf2", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "3.5", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1eb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xt", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.40", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ya", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(15\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)sc3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yh", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(23\\)sw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ja", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xk", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yo", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17d\\)sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4md", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)mr1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(4\\)f", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3ys", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(18\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2so", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ya7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)xi", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "1.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(36\\)ca4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)mb13c", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xb11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(16\\)bx", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.4.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "3.5.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xh3", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.4.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)seb4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(17\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yi1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.29", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.68", }, { model: "dragonflybsd", scope: "eq", trust: 1, vendor: "dragonflybsd", version: "1.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)t8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)sxd7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.10", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.50", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xg1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xr2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)xd1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s8a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)db1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)yx1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)t8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yu1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)w5\\(22b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)w5-27d", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(3e\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.20", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yc", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.22", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)ew5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yi", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.37", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.6\\)w5\\(9.0.5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(7\\)aa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2.2\\)t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.20", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.49", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.6", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "2.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(10c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ez", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(9\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ec1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)aa1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zj2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)t3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(2\\)xe4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xq1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)xr3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2bw", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.15", }, { model: "bsd", scope: "eq", trust: 1, vendor: "bsd", version: "4.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)s15", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(4\\)ea1e", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1.4\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)tpc10a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1db", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xg", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.35", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)da2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)sy03", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e20", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)ex4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2fy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)aa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sec2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.34.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)e7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sp1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12m\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2eu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xc", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.32", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7.4\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(13a\\)bc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.23", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(11\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.40", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6.5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.33", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(23\\)sv1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xj1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(31\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yb", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(12e\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.21", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(16\\)p", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(29a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.22", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xm1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(8\\)sa1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)fy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5e\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1.3\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ye", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.27", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xg5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17\\)a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12\\)da8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3jx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.69", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3jec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(6\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)yi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)t5", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.2.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)s13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18.2\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)yy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)t9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1aa", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)xr2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(16f\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.36", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)st8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ea1c", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.13.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8a\\)ex", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)e6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s2a", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.19", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17b\\)sxa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yb", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.39", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5f\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.24", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)st2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)e12", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(13\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)zo", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.13.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(6\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)ja", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.27", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.32", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.42", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sed", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.3\\(11b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "10.3\\(3.4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17a\\)sxa", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.21.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "4.1.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ea2a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)ew2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)yb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.8", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.13.5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.44", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2mc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3a\\)t4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xb", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)w5\\(19c\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.46", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(8\\)ja1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(6\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xr", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.33.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1.1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(8\\)zb7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)xr6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3\\)xq", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.16", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.41", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yx", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14.5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yn", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.32", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12\\)e", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.23.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sbc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.48", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.11", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.1", }, { model: "bsd", scope: "eq", trust: 1, vendor: "bsd", version: "4.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.28", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zh3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.53", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)xa3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yr", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(21a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xp", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.8.1.5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.45", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)t8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14.5\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.20", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)s6", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zd", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)t2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.35.2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)b", }, { model: "bsd os", scope: "eq", trust: 1, vendor: "bsdi", version: "4.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yf4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yk", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.22", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(24\\)sv", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.2.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)t16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sec1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.24", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xl", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "1.1.5.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2mb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(28c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)ja", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(1c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4xb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3ja", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)ea4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20.4\\)sp", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "8.3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(11\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(14\\)yq4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(22\\)ea3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2e", }, { model: "openbsd", scope: "eq", trust: 1, vendor: "openbsd", version: "3.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)zd3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2wa4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)eu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(15\\)g", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ez1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xt", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.26", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ex", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sg", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(13\\)mc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)t17", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.23", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ex", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.2", }, { model: "netbsd", scope: "eq", trust: 1, vendor: "netbsd", version: "1.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(2\\)t3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12\\)da3", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.41", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.25", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1eo", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)w5\\(21\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1t", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.51", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(24b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(17a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.26", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.23", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(26b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yj", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: null, }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.34", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)seb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)fc1", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "3.4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.51", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)xk4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s7", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xq", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.30", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.26", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.43", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "6.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xu1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(3b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(1\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)sz", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.5", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.35", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.61", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)b3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)sv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19.3\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yb4", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.8", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.12.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xf", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.29", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)yu", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)xf4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2f", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2sxf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)mx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ewa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)xr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yk", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.4", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.1.7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22.16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)da3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)bx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.18.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1\\(7\\)ca", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)ya9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1gb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(5\\)yb5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(2\\)xr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(27\\)sbc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3xs", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)ys", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.17", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)w5\\(18g\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2jx", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.34", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.15.11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2\\(16\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(6.8\\)t0a", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(11\\)yz2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)sv2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ay", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(9a\\)bc6", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "4.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)eo3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)jk2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)ey2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2zo", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.14.7", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.22.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.11.8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.0\\(22a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(18\\)ew2", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.0", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.17.10", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "2.1.5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(25\\)s", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(26\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(5c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(14\\)za2", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.5.57", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)dc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(9a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)mb3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(4\\)mx1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)s8", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.20.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.3\\)wc1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.2.21", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.31", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(4\\)t4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.4\\(9\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2ewa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(20\\)se3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2yz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(10\\)da2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)sl", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.3.39", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(3a\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.16.18", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(13b\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.25", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(15\\)bc2h", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.2bc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16.06\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)xi3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(3\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2t", }, { model: "freebsd", scope: "eq", trust: 1, vendor: "freebsd", version: "5.1", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.4.8", }, { model: "dragonflybsd", scope: "eq", trust: 1, vendor: "dragonflybsd", version: "1.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(15\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "11.1ct", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(18\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(9e\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(6e\\)", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.28", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.6.6", }, { model: "kernel", scope: "eq", trust: 1, vendor: "linux", version: "2.0.22", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(7\\)t9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3\\(11\\)yl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.3yl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.2\\(12.02\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e18", }, { model: "catos glx", scope: "eq", trust: 0.9, vendor: "cisco", version: "8.3", }, { model: null, scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "extreme", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "force10", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "hewlett packard", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "linux kernel archives", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "microsoft", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "sun microsystems", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "the sco group", version: null, }, { model: "seil/b1", scope: null, trust: 0.8, vendor: "internet initiative", version: null, }, { model: "seil/neu", scope: "eq", trust: 0.8, vendor: "internet initiative", version: "128", }, { model: "seil/neu", scope: "eq", trust: 0.8, vendor: "internet initiative", version: "2fe plus", }, { model: "seil/turbo", scope: null, trust: 0.8, vendor: "internet initiative", version: null, }, { model: "seil/x1,x2", scope: null, trust: 0.8, vendor: "internet initiative", version: null, }, { model: "opensolaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "(sparc)", }, { model: "opensolaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "(x86)", }, { model: "solaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "10 (sparc)", }, { model: "solaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "10 (x86)", }, { model: "solaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "8 (sparc)", }, { model: "solaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "8 (x86)", }, { model: "solaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "9 (sparc)", }, { model: "solaris", scope: "eq", trust: 0.8, vendor: "sun microsystems", version: "9 (x86)", }, { model: "catos", scope: "eq", trust: 0.8, vendor: "cisco", version: "7.x", }, { model: "catos", scope: "eq", trust: 0.8, vendor: "cisco", version: "8.x", }, { model: "connectra", scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: "vpn-1 power vsx", scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: "vpn-1 power/utm", scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: "vpn-1 pro/express", scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: "proxysg", scope: "lte", trust: 0.8, vendor: "blue coat", version: "6.1", }, { model: "sgos", scope: "eq", trust: 0.8, vendor: "blue coat", version: "4", }, { model: "sgos", scope: "eq", trust: 0.8, vendor: "blue coat", version: "5", }, { model: "sgos", scope: "eq", trust: 0.8, vendor: "blue coat", version: "6", }, { model: "windows 2000", scope: null, trust: 0.8, vendor: "microsoft", version: null, }, { model: "windows server 2003", scope: "eq", trust: 0.8, vendor: "microsoft", version: "none", }, { model: "windows server 2003", scope: "eq", trust: 0.8, vendor: "microsoft", version: "(itanium)", }, { model: "windows server 2003", scope: "eq", trust: 0.8, vendor: "microsoft", version: "(x64)", }, { model: "windows server 2008", scope: "eq", trust: 0.8, vendor: "microsoft", version: "(itanium)", }, { model: "windows server 2008", scope: "eq", trust: 0.8, vendor: "microsoft", version: "(x64)", }, { model: "windows server 2008", scope: "eq", trust: 0.8, vendor: "microsoft", version: "(x86)", }, { model: "windows vista", scope: "eq", trust: 0.8, vendor: "microsoft", version: "none", }, { model: "windows vista", scope: "eq", trust: 0.8, vendor: "microsoft", version: "(x64)", }, { model: "windows xp", scope: "eq", trust: 0.8, vendor: "microsoft", version: "(x64)", }, { model: "windows xp", scope: "eq", trust: 0.8, vendor: "microsoft", version: "sp3", }, { model: "rt100i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt102i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt103i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt105 series", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt107e", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt140 series", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt200i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt56v", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt58i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt60w", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rt80i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rta50i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rta52i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rta54i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rta55i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rtw65b", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rtw65i", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rtx1200", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "rtx3000", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "srt100", scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "fitelnet-e series", scope: "eq", trust: 0.8, vendor: "furukawa electric", version: "fitelnet-e20/e30", }, { model: "fitelnet-f series", scope: "eq", trust: 0.8, vendor: "furukawa electric", version: "fitelnet-f3000", }, { model: "fitelnet-f series", scope: "eq", trust: 0.8, vendor: "furukawa electric", version: "fitelnet-f40", }, { model: "fitelnet-f series", scope: "eq", trust: 0.8, vendor: "furukawa electric", version: "fitelnet-f80/f100/f120/f140/f1000/f2000", }, { model: "mucho series", scope: null, trust: 0.8, vendor: "furukawa electric", version: null, }, { model: "ip38x series", scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: "ios 12.4 gc1", scope: "ne", trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.4", scope: "ne", trust: 0.6, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.6, vendor: "cisco", version: "7.1", }, { model: "windows vista business 64-bit edition sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows vista edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "x640", }, { model: "ios 12.3b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "email and web security appliance patch", scope: "ne", trust: 0.3, vendor: "mcafee", version: "5.14", }, { model: "ios 12.4 xm3", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4jk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 xz2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 95", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4jx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "access gateway enterprise edition", scope: "ne", trust: 0.3, vendor: "citrix", version: "9.1.100.3", }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "4.3.3", }, { model: "bigip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4", }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "5.2.4.3", }, { model: "ios 12.2yg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.3(7)", }, { model: "ios 12.2sb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista enterprise 64-bit edition sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2 sb2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3jec", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 54", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "rt140i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "opensolaris build snv 93", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3yj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt105i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "windows server datacenter edition sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "windows vista enterprise 64-bit edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.3(1)", }, { model: "ios 12.4 t5e", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center manager server", scope: "eq", trust: 0.3, vendor: "nortel", version: "7.0", }, { model: "ios 12.2sz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1aa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server enterprise edition itanium", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20030", }, { model: "ios 12.3yh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home basic", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2zh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "pix/asa", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.2(4.18)", }, { model: "networks self service video server", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "ios 12.2yr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate high availability firewall and vpn", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.3.1", }, { model: "ios 12.3xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "linux enterprise sp2 debuginfo", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "ios 12.0xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s12", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "ios 12.0xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server for 32-bit systems", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20080", }, { model: "ios 12.1gb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos clr", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.4", }, { model: "opensolaris build snv 121", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.1da", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server enterprise edition itanium sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "wanjet", scope: "eq", trust: 0.3, vendor: "f5", version: "4.0", }, { model: "ios 12.1xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 xw10", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "rtx3000", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "bigip local traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4.8", }, { model: "opensolaris build snv 99", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "messaging application server", scope: "eq", trust: 0.3, vendor: "avaya", version: "0", }, { model: "linux enterprise sp1 debuginfo", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "cms server", scope: "eq", trust: 0.3, vendor: "avaya", version: "15.0", }, { model: "networks ethernet routing switch 4526fx", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "ios 12.2zl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows xp tablet pc edition sp3", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "networks ethernet routing switch 2526t-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "2500", }, { model: "rfc requirements for internet hosts communic", scope: "eq", trust: 0.3, vendor: "ietf", version: "1122:0", }, { model: "networks ethernet routing switch 4524gt-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "stonegate high availability firewall and vpn", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.2", }, { model: "windows vista business sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(18)", }, { model: "ios 12.3jl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks switched firewall sfa-6400", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "networks multimedia comm mas", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "point vpn-1 pro/express r70.1", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "ios 12.3jea", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate ips sensor and analyzer", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "5.0.1", }, { model: "windows vista ultimate 64-bit edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.4(5)", }, { model: "solaris 8 sparc", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "bigip global traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.3.1", }, { model: "ios 12.4 jk4", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center agent desktop display", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "ios 12.3xw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista enterprise 64-bit edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "0", }, { model: "networks ethernet routing switch 5698tfd-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "5000", }, { model: "opensolaris build snv 100", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "opensolaris build snv 124", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "rfc requirements for internet hosts applicat", scope: "eq", trust: 0.3, vendor: "ietf", version: "1123:0", }, { model: "ios 12.2yf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 123", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(3)", }, { model: "opensolaris build snv 49", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows server web edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "networks ethernet routing switch 2550t", scope: "eq", trust: 0.3, vendor: "nortel", version: "2500", }, { model: "ios 12.4jma", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3ja", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "windows advanced server sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(19.2)", }, { model: "access gateway enterprise edition", scope: "ne", trust: 0.3, vendor: "citrix", version: "8.1.68.7", }, { model: "ios 12.0wc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 114", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.0xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ixa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "suse linux retail solution", scope: "eq", trust: 0.3, vendor: "s u s e", version: "8.0", }, { model: "networks self-service ccss7", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "networks self-service peri nt server", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "linux enterprise desktop", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "opensolaris build snv 128", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2 sxh5", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 85", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "opensolaris build snv 19", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows vista edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "x64", }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "70000", }, { model: "opensolaris build snv 107", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "stonegate ips sensor and analyzer", scope: "ne", trust: 0.3, vendor: "stonesoft", version: "5.0.2", }, { model: "netscaler build", scope: "eq", trust: 0.3, vendor: "citrix", version: "8.157.3", }, { model: "opensolaris build snv 45", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "4.2", }, { model: "ios 12.3yx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server datacenter edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "ios 12.0xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.5", }, { model: "ios 12.1xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sra", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zya", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "cms server", scope: "eq", trust: 0.3, vendor: "avaya", version: "14.1", }, { model: "suse linux standard server", scope: "eq", trust: 0.3, vendor: "s u s e", version: "8.0", }, { model: "ios 12.2cx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ay", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt105p", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "opensolaris build snv 78", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2by", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 108", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "bigip wan optimization module", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "ios 12.2 sxf16", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 28", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.1xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks self-service peri workstation", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "windows advanced server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.2b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "firepass", scope: "eq", trust: 0.3, vendor: "f5", version: "6.0.3", }, { model: "ios 12.2zx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip application security manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.3.1", }, { model: "ios", scope: "ne", trust: 0.3, vendor: "cisco", version: "12.4(25)", }, { model: "ios 12.2sq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 89", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows server standard edition sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "networks callpilot 703t", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "ios 12.2xu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(4)", }, { model: "ir", scope: "eq", trust: 0.3, vendor: "avaya", version: "4.0", }, { model: "windows datacenter server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.3jx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 39", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "5.2.2.5", }, { model: "open-enterprise-server", scope: "eq", trust: 0.3, vendor: "s u s e", version: "0", }, { model: "ios 12.4 xe4", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks ethernet routing switch", scope: "eq", trust: 0.3, vendor: "nortel", version: "8600", }, { model: "rt102i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.0xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip global traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4.8", }, { model: "point vpn-1 pro/express r62 hfa", scope: "eq", trust: 0.3, vendor: "check", version: "01", }, { model: "cms server", scope: "eq", trust: 0.3, vendor: "avaya", version: "14.0", }, { model: "ios 12.4jdd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ec", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 90", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "opensolaris build snv 68", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "suse linux school server for i386", scope: null, trust: 0.3, vendor: "s u s e", version: null, }, { model: "ios 12.2svd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.3", }, { model: "windows server for itanium-based systems", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20080", }, { model: "ios 12.1xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "netscaler", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.1", }, { model: "opensolaris build snv 67", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "opensolaris build snv 120", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2ze", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 sxi1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2cy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows xp home sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "opensolaris build snv 51", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4 t1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2bx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "access gateway enterprise edition build", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.196.4", }, { model: "ios 12.0da", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sxa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home basic sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.3xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "ne", trust: 0.3, vendor: "cisco", version: "2.2.3", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(6)", }, { model: "ios 12.2ey", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 77", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2src", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(2)", }, { model: "opensolaris build snv 61", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.0xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(17)", }, { model: "ios 12.2ez", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rta54i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.3xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server enterprise edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.1(1)", }, { model: "ios 12.2dd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate ips sensor and analyzer", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.2.3", }, { model: "ios 12.0xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0st", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3ys", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 82", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows vista sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "5.2.4.8", }, { model: "opensolaris build snv 29", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os 4.0 n2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "pix/asa", scope: "ne", trust: 0.3, vendor: "cisco", version: "8.1(2.3)", }, { model: "ios 12.1yj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center express", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "opensolaris build snv 41", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "networks ethernet routing switch 4524gt", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "ios 12.2sxb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4.8", }, { model: "windows vista business 64-bit edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "0", }, { model: "ios 12.4xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sea", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ixb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 126", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.1xp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ixh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2seg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point software vpn-1 power/utm r62 hfa", scope: "eq", trust: 0.3, vendor: "check", version: "01", }, { model: "ios 12.4yb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 ey", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip application security manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4.8", }, { model: "ios 12.2xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks self-service mps", scope: "eq", trust: 0.3, vendor: "nortel", version: "1000", }, { model: "ios 12.4 md7", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server enterprise edition sp1 beta", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20031", }, { model: "bigip global traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.3", }, { model: "ios 12.2svc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "sun", version: "8", }, { model: "ios 12.1xw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows advanced server", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.1xu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 t2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 ja1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "pix/asa", scope: "ne", trust: 0.3, vendor: "cisco", version: "7.1(2.79)", }, { model: "ios 12.2seb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows xp media center edition sp3", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2yy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ixg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista ultimate sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "networks ethernet routing switch 5650td", scope: "eq", trust: 0.3, vendor: "nortel", version: "5000", }, { model: "ios 12.2xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1cx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos 8.4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "pix/asa", scope: "ne", trust: 0.3, vendor: "cisco", version: "8.0(4.9)", }, { model: "rt200i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "netscaler", scope: "ne", trust: 0.3, vendor: "citrix", version: "9.1.100.3", }, { model: "opensolaris build snv 130", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2fy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 xo", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server enterprise edition sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "ios 12.1yf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.1(2)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.1(3)", }, { model: "networks callpilot 600r", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "windows server sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "opensolaris build snv 105", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4jmb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks ethernet routing switch 2526t", scope: "eq", trust: 0.3, vendor: "nortel", version: "2500", }, { model: "ios 12.2so", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server standard edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "ios 12.2s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "coat systems director", scope: "eq", trust: 0.3, vendor: "blue", version: "0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.1(1)", }, { model: "ios 12.4ye", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "access gateway enterprise edition", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.0", }, { model: "ios 12.2yd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "linux enterprise sdk sp2", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "netscaler access gateway enterprise edition", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.0", }, { model: "windows vista", scope: "eq", trust: 0.3, vendor: "microsoft", version: "0", }, { model: "networks ethernet routing switch 4550t", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "windows server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "bigip sam", scope: "eq", trust: 0.3, vendor: "f5", version: "8.0", }, { model: "ios 12.2sxf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 88", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2ixc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt58i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.4 jdc", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sy10", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks symposium agent", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "ios 12.2ixd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point vpn-1 pro/express r60 hfa", scope: "eq", trust: 0.3, vendor: "check", version: "07", }, { model: "cms server", scope: "eq", trust: 0.3, vendor: "avaya", version: "16.0", }, { model: "opensolaris build snv 111", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.4(0.63)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.6(1)", }, { model: "ios 12.1ev", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 118", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.2", }, { model: "ios 12.2jk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home premium sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.4jdc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3yd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 59", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows datacenter server sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "access gateway enterprise edition build", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.070.5", }, { model: "ios 12.0xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(5)", }, { model: "ios 12.2xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center administration ccma", scope: "eq", trust: 0.3, vendor: "nortel", version: "6.0", }, { model: "ios 12.3jk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home basic 64-bit edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.3ym", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows advanced server sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "opensolaris build snv 112", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "stonegate ssl vpn engine", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "1.3.1", }, { model: "ios 12.2bc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ixf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4mr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3 yx14", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "messaging application server mm", scope: "eq", trust: 0.3, vendor: "avaya", version: "2.0", }, { model: "ios 12.2sy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 sve1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate ips sensor and analyzer", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.3.6", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(6)", }, { model: "windows server datacenter edition itanium sp1 beta", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20031", }, { model: "windows server for x64-based systems sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2008", }, { model: "ios 12.0xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "5.2.6", }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "1.6", }, { model: "solaris 8 x86", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.4(1)", }, { model: "opensolaris build snv 96", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4 t", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sec", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home basic 64-bit edition sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.4yd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate ips sensor and analyzer", scope: "ne", trust: 0.3, vendor: "stonesoft", version: "4.2.4", }, { model: "ios 12.2fz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows professional sp3", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "networks contact center manager server", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "windows vista edition sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "x64", }, { model: "ios 12.2fx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks switched firewall sf/vpn", scope: "eq", trust: 0.3, vendor: "nortel", version: "5124", }, { model: "ios 12.4jda", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "networks self-service mps", scope: "eq", trust: 0.3, vendor: "nortel", version: "5000", }, { model: "ios 12.1ez", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks ethernet routing switch 5698tfd", scope: "eq", trust: 0.3, vendor: "nortel", version: "5000", }, { model: "bigip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4.8", }, { model: "ios 12.2xo", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ea", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2irb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista business sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "bigip global traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0.1", }, { model: "ios 12.4mda", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ixe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point software vpn-1 power/utm r65 ipso ga", scope: "eq", trust: 0.3, vendor: "check", version: "6", }, { model: "ios 12.3yt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 36", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "networks ethernet routing switch 4526g-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "opensolaris", scope: "eq", trust: 0.3, vendor: "sun", version: "0", }, { model: "ios 12.2see", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "interactive response", scope: "eq", trust: 0.3, vendor: "avaya", version: "3.0", }, { model: "stonegate ips sensor and analyzer", scope: "ne", trust: 0.3, vendor: "stonesoft", version: "4.3.7", }, { model: "opensolaris build snv 48", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.2(1)", }, { model: "ios 12.2 sb1b", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1db", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server web edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(8)", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(20)", }, { model: "linux enterprise server", scope: "eq", trust: 0.3, vendor: "suse", version: "9", }, { model: "windows professional sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "rt107e", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(12)", }, { model: "windows server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.2ira", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 94", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "stonegate high availability firewall and vpn", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "5.0.2", }, { model: "windows advanced server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.3yq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "novell linux desktop", scope: "eq", trust: 0.3, vendor: "s u s e", version: "9.0", }, { model: "ios 12.4 xg4", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "firepass", scope: "eq", trust: 0.3, vendor: "f5", version: "5.5", }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "4.2.6.1", }, { model: "opensuse", scope: "eq", trust: 0.3, vendor: "s u s e", version: "10.2", }, { model: "ios 12.3za", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista business", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2yk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2dx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server itanium", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20030", }, { model: "networks secure network access identity engine ignition analytics", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "networks switched firewall sf-5114", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.3(4)", }, { model: "ios 12.4 jl1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 sga9", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "wanjet", scope: "eq", trust: 0.3, vendor: "f5", version: "5.0.2", }, { model: "opensolaris build snv 50", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.0sp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "email and web security appliance", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.1", }, { model: "ios 12.2zd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "srt100", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.4 xd12", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ex", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server for x64-based systems", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20080", }, { model: "ios 12.2 srd1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "netscaler access gateway enterprise edition", scope: "eq", trust: 0.3, vendor: "citrix", version: "8.1", }, { model: "netscaler build", scope: "eq", trust: 0.3, vendor: "citrix", version: "8.047.8", }, { model: "ios 12.4xp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3yi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center administration ccma", scope: "eq", trust: 0.3, vendor: "nortel", version: "7.0", }, { model: "ios 12.4xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt103i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "windows server itanium sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "stonegate high availability firewall and vpn", scope: "ne", trust: 0.3, vendor: "stonesoft", version: "5.0.3", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(1)", }, { model: "windows xp home sp3", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2yb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks self-service media processing server", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "ios 12.0xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista enterprise sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2zp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2bw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.1(2)", }, { model: "ios 12.2xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server datacenter edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "bigip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "9.3", }, { model: "ios 12.2ye", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks ethernet routing switch 4550t-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "opensolaris build snv 01", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "rt80i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "opensolaris build snv 92", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2xnc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3va", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks secure network access switch", scope: "eq", trust: 0.3, vendor: "nortel", version: "-40500", }, { model: "ios 12.2xnd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 xl4", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 83", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "opensolaris build snv 106", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4 ja", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "windows vista ultimate 64-bit edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "networks ethernet routing switch 4526t-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "linux enterprise desktop sp2", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "ios 12.2xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 125", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2sbc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip local traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.6.1", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(4)", }, { model: "ios 12.2yv", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "networks self service cdd", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "ios 12.1ga", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks ethernet routing switch 2550t-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "2500", }, { model: "rt100i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.2xw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.4(3)", }, { model: "bigip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4.8", }, { model: "ios 12.4xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks self-service ccxml", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "coat systems director", scope: "eq", trust: 0.3, vendor: "blue", version: "5.2.2.5", }, { model: "ios 12.0xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sed", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks secure network access identity engine ignition posture", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "stonegate high availability firewall and vpn", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.2.1", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6", }, { model: "ios 12.2sm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4md", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks callpilot 1005r", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "windows server enterprise edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "networks self-service peri application", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "opensuse", scope: "eq", trust: 0.3, vendor: "s u s e", version: "11.1", }, { model: "opensolaris build snv 76", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows xp professional edition sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "x64", }, { model: "ios 12.2xna", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point software vpn-1 power/utm r60 hfa", scope: "eq", trust: 0.3, vendor: "check", version: "07", }, { model: "ios 12.1eb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "netscaler build", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.196.4", }, { model: "point vpn-1 power vsx ngx r65", scope: "eq", trust: 0.3, vendor: "check", version: "0", }, { model: "opensolaris build snv 101a", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.3bw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 111a", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.1yd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate high availability firewall and vpn", scope: "ne", trust: 0.3, vendor: "stonesoft", version: "4.2.11", }, { model: "ios 12.3yf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 87", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.4", }, { model: "windows vista home premium sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.3yz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3yg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 t6a", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ewa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows xp professional sp3", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2za", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point software connectra r62 cm hfa", scope: "eq", trust: 0.3, vendor: "check", version: "01", }, { model: "wanjet", scope: "eq", trust: 0.3, vendor: "f5", version: "4.2.8", }, { model: "ios 12.3xz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home premium 64-bit edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "0", }, { model: "ios 12.3xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 mda", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate ssl vpn engine", scope: "ne", trust: 0.3, vendor: "stonesoft", version: "1.4", }, { model: "networks self-service peri ctx", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.2(1)", }, { model: "firepass", scope: "eq", trust: 0.3, vendor: "f5", version: "5.5.2", }, { model: "ios 12.2ja", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "sun", version: "9", }, { model: "opensolaris build snv 113", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2zc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4ja", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point software connectra r66.1", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "networks contact center manager server", scope: "eq", trust: 0.3, vendor: "nortel", version: "6.0", }, { model: "networks ethernet routing switch 5650td-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "5000", }, { model: "ios 12.4 yb", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 57", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows xp tablet pc edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "linux enterprise server sp1", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "windows server enterprise edition itanium sp1 beta", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20031", }, { model: "netscaler", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.0", }, { model: "ios 12.4xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1e", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4gc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "firepass", scope: "eq", trust: 0.3, vendor: "f5", version: "6.0", }, { model: "ios 12.1yi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "4.2.8.7", }, { model: "networks ethernet routing switch 4526gtx", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "rta50i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "opensolaris build snv 119", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "bigip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4.5", }, { model: "ios 12.4xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1az", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensuse", scope: "eq", trust: 0.3, vendor: "s u s e", version: "11.0", }, { model: "ios 12.2da", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea13", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home basic 64-bit edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(5.3)", }, { model: "ios 12.2xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point software vpn-1 power/utm r70.1", scope: null, trust: 0.3, vendor: "check", version: null, }, { model: "point vpn-1 power vsx vsx-1", scope: "eq", trust: 0.3, vendor: "check", version: "0", }, { model: "stonegate ips sensor and analyzer", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.2.2", }, { model: "coat systems proxysg 200-c", scope: "eq", trust: 0.3, vendor: "blue", version: "0", }, { model: "bigip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "10.1", }, { model: "stonegate high availability firewall and vpn", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.3", }, { model: "bigip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0.1", }, { model: "ios 12.2yu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "cms server", scope: "eq", trust: 0.3, vendor: "avaya", version: "16.1", }, { model: "windows datacenter server sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "opensolaris build snv 110", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "bigip local traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.6", }, { model: "ios 12.2sga", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(15)", }, { model: "windows datacenter server", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "rt60w", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.1dc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server for itanium-based systems sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2008", }, { model: "networks switched firewall sfa-6600", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "1.0", }, { model: "interactive response", scope: "eq", trust: 0.3, vendor: "avaya", version: "4.0", }, { model: "ios 12.0sl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.2(2)", }, { model: "windows server itanium sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "windows server sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "ios 12.2sxh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt140p", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.2xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 sm5", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip local traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4", }, { model: "ios 12.1eu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 sw3", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "messaging application server mm", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.1", }, { model: "ios 12.3jeb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip application security manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.3", }, { model: "windows vista ultimate", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "windows server for 32-bit systems sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2008", }, { model: "networks secure network access switch", scope: "eq", trust: 0.3, vendor: "nortel", version: "-40700", }, { model: "ios 12.1xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks callpilot 201i", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "ios 12.4 xy4", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2mc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 yd", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 se", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home premium", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "wanjet", scope: "eq", trust: 0.3, vendor: "f5", version: "5.0", }, { model: "linux enterprise desktop sp1", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "coat systems director", scope: "eq", trust: 0.3, vendor: "blue", version: "4.2.2.4", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.4(2)", }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "1.2", }, { model: "ios 12.2 sq2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "rt105", scope: null, trust: 0.3, vendor: "yamaha", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "4.3", }, { model: "opensolaris build snv 122", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.1yh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 131", scope: "ne", trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2sx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 109", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(5)", }, { model: "netscaler build", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.070.5", }, { model: "ios 12.0sz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(2)", }, { model: "ios 12.2 se5", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "point vpn-1 pro/express r65 ipso ga", scope: "eq", trust: 0.3, vendor: "check", version: "6", }, { model: "ios 12.3yu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks self-service mps", scope: "eq", trust: 0.3, vendor: "nortel", version: "10000", }, { model: "ios 12.1ya", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "1.8", }, { model: "bigip global traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "ios 12.3xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(10)", }, { model: "point vpn-1 pro/express r65 hfa", scope: "eq", trust: 0.3, vendor: "check", version: "50", }, { model: "netscaler", scope: "ne", trust: 0.3, vendor: "citrix", version: "8.1.68.7", }, { model: "ios 12.4xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 102", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.1ey", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "solaris 9 sparc", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "opensolaris build snv 02", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.3eu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista ultimate 64-bit edition sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2su", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "1.4.1", }, { model: "point software connectra r62 hfa", scope: "eq", trust: 0.3, vendor: "check", version: "01", }, { model: "ios 12.4xw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sca", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows datacenter server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.2sef", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ew", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sz10", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip local traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.3.5", }, { model: "ios 12.1xz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt105e", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "opensolaris build snv 80", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4sw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt140f", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.2se", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0.1", }, { model: "networks contact center administration", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "ios 12.1eo", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 ya2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 104", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.3yk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "coat systems proxysg 8100-c", scope: "eq", trust: 0.3, vendor: "blue", version: "0", }, { model: "ios 12.2yh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks callpilot 202i", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "windows professional sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.3xu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0w", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensuse", scope: "eq", trust: 0.3, vendor: "s u s e", version: "10.1", }, { model: "rt56v", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "linux enterprise server", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "opensolaris build snv 38", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(19)", }, { model: "ios 12.2 ixh", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "linux enterprise server", scope: "eq", trust: 0.3, vendor: "suse", version: "11", }, { model: "ios 12.2yz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks callpilot 1002rp", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "ios 12.2sxe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 129", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(16)", }, { model: "ios 12.4 md2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "4.2.1.6", }, { model: "ios 12.2 se2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 jdd", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center ncc", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.5(1)", }, { model: "ios 12.2xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center cct", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "ios 12.2scb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rtw65i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "networks ethernet routing switch 4548gt-pwr", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "ios 12.1xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 mr2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.2(0.65)", }, { model: "networks switched firewall sf-5109", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "stonegate ssl vpn engine", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "1.1", }, { model: "networks self-service peri ivr", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "ios 12.2zy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip global traffic manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4", }, { model: "bigip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0.1", }, { model: "ios 12.2 srb5a", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "networks self-service wvads", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "ios 12.2sve", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2irc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(1)", }, { model: "windows server web edition sp2", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "ios 12.3 ym13", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 jx", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sy8", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yo", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ys", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 84", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.3(2)", }, { model: "ios 12.2 sb14", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 sb13", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "messaging application server mm", scope: "eq", trust: 0.3, vendor: "avaya", version: "3.0", }, { model: "ios 12.2zj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate high availability firewall and vpn", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.2.2", }, { model: "ios 12.2mb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "linux enterprise server sp2", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "ios 12.2ex", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows xp media center edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.1ew", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0wt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s3", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4 xr", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 98", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2xnb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rta55i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.1ax", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 da14", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server datacenter edition itanium", scope: "eq", trust: 0.3, vendor: "microsoft", version: "20030", }, { model: "opensolaris build snv 117", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "messaging application server mm", scope: "eq", trust: 0.3, vendor: "avaya", version: "3.1", }, { model: "ios 12.2yc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 58", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "networks contact center manager", scope: null, trust: 0.3, vendor: "nortel", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(7)", }, { model: "ios 12.2sv", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home basic sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1ye", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4", }, { model: "ios 12.2srd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip wan optimization module", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0.1", }, { model: "ios 12.2sva", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks self-service speech server", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "opensolaris build snv 22", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "networks contact center tapi server", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "ios 12.0 sy9a", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 81", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.3xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate high availability firewall and vpn", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.2.10", }, { model: "ios 12.2bz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip application security manager", scope: "eq", trust: 0.3, vendor: "f5", version: "9.4", }, { model: "opensolaris build snv 103", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "5.2", }, { model: "ios 12.3xy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sxi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "linux enterprise", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "ios 12.2 sg", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ym", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center multimedia & outbound", scope: "eq", trust: 0.3, vendor: "nortel", version: "6.0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(3)", }, { model: "ios 12.0t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "linux enterprise", scope: "eq", trust: 0.3, vendor: "suse", version: "11", }, { model: "rta52i", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "ios 12.4ya", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "stonegate ips sensor and analyzer", scope: "eq", trust: 0.3, vendor: "stonesoft", version: "4.2", }, { model: "ios 12.2xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "networks ethernet routing switch 4526t", scope: "eq", trust: 0.3, vendor: "nortel", version: "4500", }, { model: "rtx1200", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "networks secure network access identity engines ignition server", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "nx-os", scope: "ne", trust: 0.3, vendor: "cisco", version: "4.1(4)", }, { model: "windows vista enterprise", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2ste", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server standard edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "ios 12.2cz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1yb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4jl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista ultimate sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2yw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sxd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rtw65b", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "windows vista home premium 64-bit edition sp1", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2 zya1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server enterprise edition", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003x64", }, { model: "ios 12.2xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 13", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "cms server", scope: "eq", trust: 0.3, vendor: "avaya", version: "16.2", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.1", }, { model: "access gateway enterprise edition", scope: "eq", trust: 0.3, vendor: "citrix", version: "9.1", }, { model: "opensolaris build snv 91", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2 scb1", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "sun", version: "10", }, { model: "ios 12.3tpc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2ya", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3jed", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 47", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "4.2.10", }, { model: "opensolaris build snv 64", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2 irc", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "bigip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "ios 12.4 jda3", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 37", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "opensolaris build snv 101", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows professional sp4", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.3 bc9", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 115", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.3bc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2zu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1xy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "solaris 10 x86", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.3ya", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2 src3", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks self service voicexml", scope: "eq", trust: 0.3, vendor: "nortel", version: "0", }, { model: "windows vista enterprise sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.4xy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.4xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2sg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "rt140e", scope: "eq", trust: 0.3, vendor: "yamaha", version: "0", }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.5(9)", }, { model: "ios 12.4 md", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows xp professional sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2srb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos 7.6", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensuse", scope: "eq", trust: 0.3, vendor: "suse", version: "10.3", }, { model: "ios 12.4 xr4", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista business 64-bit edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "8.2(2)", }, { model: "linux enterprise sdk", scope: "eq", trust: 0.3, vendor: "suse", version: "10", }, { model: "coat systems proxysg", scope: "eq", trust: 0.3, vendor: "blue", version: "0", }, { model: "solaris 9 x86", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.2xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "windows vista home premium 64-bit edition sp2", scope: null, trust: 0.3, vendor: "microsoft", version: null, }, { model: "ios 12.2zb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0db", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "point software vpn-1 power/utm r65 hfa", scope: "eq", trust: 0.3, vendor: "check", version: "50", }, { model: "ios 12.3 bc6", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "suse linux openexchange server", scope: "eq", trust: 0.3, vendor: "s u s e", version: "4.0", }, { model: "ios 12.4 xq2", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "catos", scope: "eq", trust: 0.3, vendor: "cisco", version: "7.6(8)", }, { model: "windows server datacenter edition sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "ios 12.0dc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.3 jec3", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "windows server sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, { model: "ios 12.2tpc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.2yj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "catos 8.7", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 116", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "ios 12.4 ye", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 127", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows server datacenter edition itanium sp1", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2003", }, { model: "bigip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "9.3.1", }, { model: "networks secure network access identity engine guest manager", scope: "eq", trust: 0.3, vendor: "nortel", version: "-0", }, { model: "ios 12.2 mc2m", scope: "ne", trust: 0.3, vendor: "cisco", version: null, }, { model: "networks contact center multimedia & outbound", scope: "eq", trust: 0.3, vendor: "nortel", version: "7.0", }, { model: "ios 12.0sx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "opensolaris build snv 86", scope: null, trust: 0.3, vendor: "sun", version: null, }, { model: "windows server", scope: "eq", trust: 0.3, vendor: "microsoft", version: "2000", }, ], sources: [ { db: "CERT/CC", id: "VU#723308", }, { db: "BID", id: "31545", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, { db: "CNNVD", id: "CNNVD-200810-307", }, { db: "NVD", id: "CVE-2008-4609", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/o:oracle:solaris", vulnerable: true, }, { cpe22Uri: "cpe:/o:sun:opensolaris", vulnerable: true, }, { cpe22Uri: "cpe:/o:sun:solaris", vulnerable: true, }, { cpe22Uri: "cpe:/o:cisco:catos", vulnerable: true, }, { cpe22Uri: "cpe:/o:cisco:ios", vulnerable: true, }, { cpe22Uri: "cpe:/o:cisco:ios_xe", vulnerable: true, }, { cpe22Uri: "cpe:/h:cisco:pix_asa", vulnerable: true, }, { cpe22Uri: "cpe:/a:checkpoint:connectra", vulnerable: true, }, { cpe22Uri: "cpe:/a:checkpoint:vpn-1_power_vsx", vulnerable: true, }, { cpe22Uri: "cpe:/a:checkpoint:vpn-1_power_utm", vulnerable: true, }, { cpe22Uri: "cpe:/a:checkpoint:vpn-1_pro_express", vulnerable: true, }, { cpe22Uri: "cpe:/h:bluecoat:proxysg", vulnerable: true, }, { cpe22Uri: "cpe:/o:bluecoat:sgos", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_2000", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_server_2003", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_server_2008", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_vista", vulnerable: true, }, { cpe22Uri: "cpe:/o:microsoft:windows_xp", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt100i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt102i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt103i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt105", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt107e", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt140", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt200i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt250i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt300i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt56v", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt57i_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt58i_firmware", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt60w", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rt80i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rta50i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rta52i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rta54i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rta55i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtv700", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtw65b", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtw65i", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtx1000", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtx1100", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtx1200", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtx1500", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtx2000", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:rtx3000", vulnerable: true, }, { cpe22Uri: "cpe:/h:yamaha:srt100", vulnerable: true, }, { cpe22Uri: "cpe:/h:furukawa_electric:fitelnet", vulnerable: true, }, { cpe22Uri: "cpe:/h:furukawa_electric:fitelnet-f", vulnerable: true, }, { cpe22Uri: "cpe:/h:furukawa_electric:mucho", vulnerable: true, }, { cpe22Uri: "cpe:/h:nec:ip38x", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2009-002090", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Robert E. Lee and Jack C. Lewis", sources: [ { db: "BID", id: "31545", }, { db: "CNNVD", id: "CNNVD-200810-307", }, ], trust: 0.9, }, cve: "CVE-2008-4609", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", exploitabilityScore: 8.6, id: "CVE-2008-4609", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 1.9, vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", exploitabilityScore: 8.6, id: "VHN-34734", impactScore: 6.9, integrityImpact: "NONE", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "nvd@nist.gov", id: "CVE-2008-4609", trust: 1, value: "HIGH", }, { author: "CARNEGIE MELLON", id: "VU#723308", trust: 0.8, value: "15.59", }, { author: "NVD", id: "CVE-2008-4609", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-200810-307", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-34734", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2008-4609", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "CERT/CC", id: "VU#723308", }, { db: "VULHUB", id: "VHN-34734", }, { db: "VULMON", id: "CVE-2008-4609", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, { db: "CNNVD", id: "CNNVD-200810-307", }, { db: "NVD", id: "CVE-2008-4609", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. Part of the Transmission Control Protocol (TCP) specification (RFC 1122) allows a receiver to advertise a zero byte window, instructing the sender to maintain the connection but not send additional TCP payload data. The sender should then probe the receiver to check if the receiver is ready to accept data. Narrow interpretation of this part of the specification can create a denial-of-service vulnerability. By advertising a zero receive window and acknowledging probes, a malicious receiver can cause a sender to consume resources (TCP state, buffers, and application memory), preventing the targeted service or system from handling legitimate connections. Transmission Control Protocol (TCP) Multiple implementations of service disruption (DoS) Vulnerabilities exist. RFC793 It is prescribed by Transmission Control Protocol (TCP) Implementation of service disruption due to misuse of available resources after connection establishment (DoS) Vulnerabilities exist.Service operation disrupted by a remote third party (DoS) There is a possibility of being attacked. The core TCP/IP protocol is prone to multiple remote denial-of-service vulnerabilities. \nThe issues are tracked by Cisco Bug IDs CSCsv04836, CSCsv07712, CSCsv66169, CSCsv02768, CSCsv08325, and CSCsv08579. \nThese issues are reported to affect multiple vendors' implementations of the TCP/IP stack. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nBlue Coat ProxySG TCP Implementation Denial of Service\nVulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37044\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37044/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Blue Coat ProxySG, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerabilities are caused due to errors in the TCP\nimplementation when processing TCP packets. These can be exploited to\nexhaust system resources and render the appliance unresponsive to\nlegitimate requests. \n\nSOLUTION:\nPlease consult the vendor's advisory for potential workaround\ninformation. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Outpost24. \n\nORIGINAL ADVISORY:\nhttps://kb.bluecoat.com/index?page=content&id=SA37\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c01923093\nVersion: 1\n\nHPSBMI02473 SSRT080138 rev.1 - Cisco Catalyst Blade Switch 3020/3120, Remote Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2009-11-17\nLast Updated: 2009-11-17\n\nPotential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential vulnerability has been identified with the Cisco Catalyst Blade Switch 3020/3021. The vulnerability could be exploited remotely to create a Denial of Service (DoS). \n\nReferences: CVE-2008-4609, Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products(cisco-sa-20090908-tcp24)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nCisco Catalyst Blade Switch 3020 for c-Class BladeSystem running firmware earlier than v12.2(50)\nCisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP running firmware earlier than v12.2(50)\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2008-4609 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided firmware updates to resolve this vulnerability. \n\nProduct\n Firmware Version\n\nCisco Catalyst Blade Switch 3020 for c-Class BladeSystem\n 12.2(50) SE1 or subsequent\n\nCisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP\n 12.2(50) SE1 or subsequent\n\nTo Locate the Firmware Update\n\nBrowse to http://www.hp.com and do the following:\n\nSelect \"Support & Drivers\"\nIn Step 1 select \"Download drivers and software (and firmware)\"\nIn Step 2 enter \"Cisco Catalyst Blade Switch\"\nClick on \"Go\"\nSelect the desired product\nSelect the desired Windows operating system\nClick on \"Firmware - Blade Infrastructure\"\n\nPRODUCT SPECIFIC INFORMATION\nNone\n\nHISTORY\nVersion:1 (rev.1) - 17 November 2009 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber's choice for Business: sign-in. \nOn the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing & Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2009 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAksEDAMACgkQ4B86/C0qfVm87gCgliWdpIKldzOKHRvJA5r9gR4Z\nge0AoMu3ueCbIB4y3HUmT/jReUzE4jym\n=uBei\n-----END PGP SIGNATURE-----\n", sources: [ { db: "NVD", id: "CVE-2008-4609", }, { db: "CERT/CC", id: "VU#723308", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, { db: "BID", id: "31545", }, { db: "VULHUB", id: "VHN-34734", }, { db: "VULMON", id: "CVE-2008-4609", }, { db: "PACKETSTORM", id: "82078", }, { db: "PACKETSTORM", id: "82772", }, ], trust: 2.97, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://www.scap.org.cn/vuln/vhn-34734", trust: 0.1, type: "unknown", }, ], sources: [ { db: "VULHUB", id: "VHN-34734", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2008-4609", trust: 3, }, { db: "USCERT", id: "TA09-251A", trust: 2.6, }, { db: "CERT/CC", id: "VU#723308", trust: 2, }, { db: "BID", id: "31545", trust: 1.2, }, { db: "SECUNIA", id: "37044", trust: 0.9, }, { db: "VUPEN", id: "ADV-2009-2954", trust: 0.8, }, { db: "VUPEN", id: "ADV-2009-2567", trust: 0.8, }, { db: "SECUNIA", id: "36802", trust: 0.8, }, { db: "SECUNIA", id: "36602", trust: 0.8, }, { db: "SECUNIA", id: "36603", trust: 0.8, }, { db: "SECUNIA", id: "36597", trust: 0.8, }, { db: "USCERT", id: "SA09-251A", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2009-002090", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-200810-307", trust: 0.6, }, { db: "PACKETSTORM", id: "82772", trust: 0.2, }, { db: "VULHUB", id: "VHN-34734", trust: 0.1, }, { db: "VULMON", id: "CVE-2008-4609", trust: 0.1, }, { db: "PACKETSTORM", id: "82078", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#723308", }, { db: "VULHUB", id: "VHN-34734", }, { db: "VULMON", id: "CVE-2008-4609", }, { db: "BID", id: "31545", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, { db: "PACKETSTORM", id: "82078", }, { db: "PACKETSTORM", id: "82772", }, { db: "CNNVD", id: "CNNVD-200810-307", }, { db: "NVD", id: "CVE-2008-4609", }, ], }, id: "VAR-200810-0010", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-34734", }, ], trust: 0.7284717799999999, }, last_update_date: "2024-11-29T19:42:56.910000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "sk42723", trust: 0.8, url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_dogoviewsolutiondetails=&solutionid=sk42723", }, { title: "cisco-sa-20090908-tcp24", trust: 0.8, url: "http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml", }, { title: "20091009", trust: 0.8, url: "http://www.furukawa.co.jp/fitelnet/topic/vulnera_20091009.html", }, { title: "MS09-048", trust: 0.8, url: "http://www.microsoft.com/technet/security/bulletin/MS09-048.mspx", }, { title: "NV09-014", trust: 0.8, url: "http://www.nec.co.jp/security-info/secinfo/nv09-014.html", }, { title: "Text Form of Oracle Critical Patch Update - July 2012 Risk Matrices", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/cpujul2012verbose-392736.html", }, { title: "Oracle Critical Patch Update Advisory - July 2012", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { title: "TCPの実装におけるサービス運用妨害(DoS)の脆弱性について", trust: 0.8, url: "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU943657.html", }, { title: "SA41", trust: 0.8, url: "https://kb.bluecoat.com/index?page=content&id=SA41", }, { title: "July 2012 Critical Patch Update Released", trust: 0.8, url: "https://blogs.oracle.com/security/entry/july_2012_critical_patch_update", }, { title: "TCPセッション処理に関する脆弱性", trust: 0.8, url: "http://www.seil.jp/seilseries/security/2009/a00667.php", }, { title: "267088", trust: 0.8, url: "http://jp.sunsolve.sun.com/search/document.do?assetkey=1-66-267088-1", }, { title: "MS09-048", trust: 0.8, url: "http://www.microsoft.com/japan/technet/security/bulletin/ms09-048.mspx", }, { title: "MS09-048e", trust: 0.8, url: "http://www.microsoft.com/japan/security/bulletins/MS09-048e.mspx", }, { title: "JVNVU#943657", trust: 0.8, url: "http://software.fujitsu.com/jp/security/vulnerabilities/vu943657.html", }, { title: "TA09-251A", trust: 0.8, url: "http://software.fujitsu.com/jp/security/vulnerabilities/ta09-251a.html", }, { title: "Symantec Security Advisories: SA38: Blue Coat ProxyAV Advisory on Sockstress TCP Attacks", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=fb80a5c8f4ca8d75f9df074d6d82e182", }, { title: "Cisco: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20090908-tcp24", }, { title: "Symantec Security Advisories: SA41 : Blue Coat ProxySG Advisory on Sockstress TCP Attacks (CVE-2008-4609)", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=d8370cc1d406e0cbe214c88e6d3d62d7", }, { title: "Symantec Security Advisories: SA34 : Blue Coat iShared Advisory on Sockstress TCP Attacks (CVE-2008-4609)", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=85b57218eec77ee0396becd56404d8f1", }, { title: "Symantec Security Advisories: SA35 : Blue Coat Director Advisory on Sockstress TCP Attacks", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=7d4c01e5a8411a8e49f47e52a356544c", }, { title: "Symantec Security Advisories: SA39 : Blue Coat PacketShaper Advisory on Sockstress TCP Attacks", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=1ace87e00398301b8248ba77512ee922", }, { title: "", trust: 0.1, url: "https://github.com/Live-Hack-CVE/CVE-2008-4609 ", }, { title: "sockstress", trust: 0.1, url: "https://github.com/marcelki/sockstress ", }, { title: "awesome-network-stuff", trust: 0.1, url: "https://github.com/alphaSeclab/awesome-network-stuff ", }, { title: "awesome-network-stuff", trust: 0.1, url: "https://github.com/aniksarakash/awesome-network-stuff ", }, { title: "", trust: 0.1, url: "https://github.com/CVEDB/PoC-List ", }, ], sources: [ { db: "VULMON", id: "CVE-2008-4609", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-16", trust: 1.9, }, { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "CWE-noinfo", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-34734", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, { db: "NVD", id: "CVE-2008-4609", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 3.7, url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { trust: 2.6, url: "http://www.cpni.gov.uk/docs/tn-03-09-security-assessment-tcp.pdf", }, { trust: 2.6, url: "http://www.us-cert.gov/cas/techalerts/ta09-251a.html", }, { trust: 2.1, url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { trust: 1.8, url: "http://www.cisco.com/en/us/products/products_security_response09186a0080a15120.html", }, { trust: 1.8, url: "http://www.cisco.com/en/us/products/products_security_advisory09186a0080af511d.shtml", }, { trust: 1.8, url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { trust: 1.8, url: "http://www.mandriva.com/security/advisories?name=mdvsa-2013:150", }, { trust: 1.8, url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { trust: 1.8, url: "http://searchsecurity.techtarget.com.au/articles/27154-tcp-is-fundamentally-borked", }, { trust: 1.8, url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { trust: 1.8, url: "http://lists.immunitysec.com/pipermail/dailydave/2008-october/005360.html", }, { trust: 1.8, url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { trust: 1.8, url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6340", }, { trust: 1.7, url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { trust: 1.6, url: "http://tools.ietf.org/html/draft-ananth-tcpm-persist-01", }, { trust: 1.6, url: "http://www.securityfocus.com/archive/1/507953", }, { trust: 1.2, url: "http://www.kb.cert.org/vuls/id/723308", }, { trust: 1.1, url: "http://www.microsoft.com/technet/security/bulletin/ms09-048.mspx", }, { trust: 1.1, url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-267088-1", }, { trust: 0.9, url: "http://secunia.com/advisories/37044/", }, { trust: 0.8, url: "http://tools.ietf.org/html/rfc1122#page-92", }, { trust: 0.8, url: "http://tools.ietf.org/html/draft-mahesh-persist-timeout-02", }, { trust: 0.8, url: "http://shlang.com/netkill/", }, { trust: 0.8, url: "http://www.netasq.com/en/threats/sockstress.php", }, { trust: 0.8, url: "http://www.phrack.org/issues.html?issue=66&id=9#article", }, { trust: 0.8, url: "http://isc.sans.org/diary.html?storyid=5104", }, { trust: 0.8, url: "http://www.t2.fi/2008/08/27/jack-c-louis-and-robert-e-lee-to-talk-about-new-dos-attack-vectors/", }, { trust: 0.8, url: "http://www.darkreading.com/blog.asp?blog_sectionid=403&doc_id=164939&wt.svl=tease2_2", }, { trust: 0.8, url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg04040.html", }, { trust: 0.8, url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg03826.html", }, { trust: 0.8, url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg03503.html", }, { trust: 0.8, url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg02870.html", }, { trust: 0.8, url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg02557.html", }, { trust: 0.8, url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg02189.html", }, { trust: 0.8, url: "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git;a=blob;f=net/ipv4/tcp_timer.c;h=b144a26359bcf34a4b0606e171f97dc709afdfbb;hb=120f68c426e746771e8c09736c0f753822ff3f52#l233", }, { trust: 0.8, url: "http://sla.ckers.org/forum/read.php?14,27324", }, { trust: 0.8, url: "http://www.checkpoint.com/defense/advisories/public/announcement/090809-tcpip-dos-sockstress.html", }, { trust: 0.8, url: "http://www.securityfocus.com/archive/1/archive/1/506331/100/0/", }, { trust: 0.8, url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk42725", }, { trust: 0.8, url: "http://kbase.redhat.com/faq/docs/doc-21623", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4609", }, { trust: 0.8, url: "http://www.cpni.gov.uk/products/technicalnotes/feb-09-security-assessment-tcp.aspx", }, { trust: 0.8, url: "http://tools.ietf.org/html/rfc793", }, { trust: 0.8, url: "http://www.ipa.go.jp/security/vuln/vuln_tcpip.html", }, { trust: 0.8, url: "http://www.jpcert.or.jp/at/2009/at090019.txt", }, { trust: 0.8, url: "http://www.jpcert.or.jp/at/2009/at090018.txt", }, { trust: 0.8, url: "http://jvn.jp/cert/jvnvu943657/index.html", }, { trust: 0.8, url: "http://jvn.jp/cert/jvnta09-251a/", }, { trust: 0.8, url: "http://jvn.jp/tr/jvntr-2009-22", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4609", }, { trust: 0.8, url: "http://secunia.com/advisories/36802", }, { trust: 0.8, url: "http://secunia.com/advisories/36597", }, { trust: 0.8, url: "http://secunia.com/advisories/36603", }, { trust: 0.8, url: "http://secunia.com/advisories/36602", }, { trust: 0.8, url: "http://www.securityfocus.com/bid/31545", }, { trust: 0.8, url: "http://www.us-cert.gov/cas/alerts/sa09-251a.html", }, { trust: 0.8, url: "http://www.vupen.com/english/advisories/2009/2567", }, { trust: 0.8, url: "http://www.vupen.com/english/advisories/2009/2954", }, { trust: 0.8, url: "http://www.cyberpolice.go.jp/#topics", }, { trust: 0.4, url: "https://kb.bluecoat.com/index?page=content&id=sa37", }, { trust: 0.3, url: "http://blogs.technet.com/srd/archive/2009/09/08/assessing-the-risk-of-the-september-critical-security-bulletins.aspx", }, { trust: 0.3, url: "http://blogs.technet.com/srd/archive/2009/09/08/ms09-048-tcp-ip-vulnerabilities.aspx", }, { trust: 0.3, url: "/archive/1/504375", }, { trust: 0.3, url: "http://support.nortel.com/go/main.jsp?cscat=bltndetail&documentoid=971633&poid=", }, { trust: 0.3, url: "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu943657.html", }, { trust: 0.3, url: "http://support.avaya.com/css/p8/documents/100065311", }, { trust: 0.3, url: "http://support.avaya.com/css/p8/documents/100065799", }, { trust: 0.3, url: "http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml", }, { trust: 0.3, url: "http://www.cisco.com/warp/public/707/cisco-sr-20081017-tcp.shtml", }, { trust: 0.3, url: "https://kc.mcafee.com/corporate/index?page=content&id=kb66963", }, { trust: 0.3, url: "http://support.citrix.com/article/ctx123649", }, { trust: 0.3, url: "http://www11.itrc.hp.com/service/cki/docdisplay.do?doclocale=en&docid=emr_na-c01923093-1", }, { trust: 0.3, url: "http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=962027", }, { trust: 0.3, url: "https://kb.bluecoat.com/index?page=content&id=sa36", }, { trust: 0.3, url: "https://kb.bluecoat.com/index?page=content&id=sa35", }, { trust: 0.3, url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk42723", }, { trust: 0.3, url: "https://support.f5.com/kb/en-us/solutions/public/10000/500/sol10509.html", }, { trust: 0.3, url: "http://www.stonesoft.com/en/support/security_advisories/2009_17_09.html", }, { trust: 0.1, url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/16.html", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/.html", }, { trust: 0.1, url: "https://github.com/live-hack-cve/cve-2008-4609", }, { trust: 0.1, url: "https://github.com/marcelki/sockstress", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20090908-tcp24", }, { trust: 0.1, url: "http://secunia.com/advisories/secunia_security_advisories/", }, { trust: 0.1, url: "http://secunia.com/advisories/business_solutions/", }, { trust: 0.1, url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org", }, { trust: 0.1, url: "http://secunia.com/advisories/about_secunia_advisories/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2008-4609", }, { trust: 0.1, url: "http://www.itrc.hp.com/service/cki/secbullarchive.do", }, { trust: 0.1, url: "http://www.hp.com", }, { trust: 0.1, url: "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc", }, { trust: 0.1, url: "http://h30046.www3.hp.com/subsignin.php", }, ], sources: [ { db: "CERT/CC", id: "VU#723308", }, { db: "VULHUB", id: "VHN-34734", }, { db: "VULMON", id: "CVE-2008-4609", }, { db: "BID", id: "31545", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, { db: "PACKETSTORM", id: "82078", }, { db: "PACKETSTORM", id: "82772", }, { db: "CNNVD", id: "CNNVD-200810-307", }, { db: "NVD", id: "CVE-2008-4609", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#723308", }, { db: "VULHUB", id: "VHN-34734", }, { db: "VULMON", id: "CVE-2008-4609", }, { db: "BID", id: "31545", }, { db: "JVNDB", id: "JVNDB-2009-002090", }, { db: "PACKETSTORM", id: "82078", }, { db: "PACKETSTORM", id: "82772", }, { db: "CNNVD", id: "CNNVD-200810-307", }, { db: "NVD", id: "CVE-2008-4609", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2009-11-23T00:00:00", db: "CERT/CC", id: "VU#723308", }, { date: "2008-10-20T00:00:00", db: "VULHUB", id: "VHN-34734", }, { date: "2008-10-20T00:00:00", db: "VULMON", id: "CVE-2008-4609", }, { date: "2008-10-02T00:00:00", db: "BID", id: "31545", }, { date: "2009-10-14T00:00:00", db: "JVNDB", id: "JVNDB-2009-002090", }, { date: "2009-10-20T06:28:49", db: "PACKETSTORM", id: "82078", }, { date: "2009-11-18T16:25:02", db: "PACKETSTORM", id: "82772", }, { date: "2008-10-20T00:00:00", db: "CNNVD", id: "CNNVD-200810-307", }, { date: "2008-10-20T17:59:26.163000", db: "NVD", id: "CVE-2008-4609", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2013-02-13T00:00:00", db: "CERT/CC", id: "VU#723308", }, { date: "2022-12-14T00:00:00", db: "VULHUB", id: "VHN-34734", }, { date: "2022-12-14T00:00:00", db: "VULMON", id: "CVE-2008-4609", }, { date: "2012-07-30T20:21:00", db: "BID", id: "31545", }, { date: "2012-07-20T00:00:00", db: "JVNDB", id: "JVNDB-2009-002090", }, { date: "2019-05-05T00:00:00", db: "CNNVD", id: "CNNVD-200810-307", }, { date: "2024-11-21T00:52:05.603000", db: "NVD", id: "CVE-2008-4609", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-200810-307", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "TCP may keep its offered receive window closed indefinitely (RFC 1122)", sources: [ { db: "CERT/CC", id: "VU#723308", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "configuration error", sources: [ { db: "CNNVD", id: "CNNVD-200810-307", }, ], trust: 0.6, }, }
gsd-2008-4609
Vulnerability from gsd
{ GSD: { alias: "CVE-2008-4609", description: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", id: "GSD-2008-4609", references: [ "https://www.suse.com/security/cve/CVE-2008-4609.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2008-4609", ], details: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", id: "GSD-2008-4609", modified: "2023-12-13T01:23:00.203245Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-4609", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", refsource: "MISC", url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { name: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", refsource: "MISC", url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { name: "HPSBMI02473", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { name: "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation", refsource: "MLIST", url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { name: "http://insecure.org/stf/tcp-dos-attack-explained.html", refsource: "MISC", url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { name: "http://www.outpost24.com/news/news-2008-10-02.html", refsource: "MISC", url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { name: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", refsource: "MISC", url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { name: "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products", refsource: "CISCO", url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { name: "TA09-251A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { name: "20081017 Cisco Response to Outpost24 TCP State Table Manipulation Denial of Service Vulnerabilities", refsource: "CISCO", url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { name: "MS09-048", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { name: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", refsource: "MISC", url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { name: "oval:org.mitre.oval:def:6340", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { name: "MDVSA-2013:150", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { name: "SSRT080138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(3.4\\)bp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.19:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.31:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6.8a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)bx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t1a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16.06\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26\\)p5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(26\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(28\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)sy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11.5\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(20.3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)ys_1.2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)ca2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)yb4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1x\\(l\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)dc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.36:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17b\\)sxa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)t10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsd:bsd:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)wt6\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5a\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)t7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(15b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)su2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.38:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(22\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1ct:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2bc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ay:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)cx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2pb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(5d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(27b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2n:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.6\\)w5\\(9.0.5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1a\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(3h\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(23\\)e4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10\\)da2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)tpc10a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.99.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.37:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1ia:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-32a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8.0.2\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)e6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(11\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(16\\)p:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)db1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sx1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ja1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0.12\\(a\\)bt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(20\\)aa4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(18\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)xaf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(11\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(15a\\)p:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(15\\)g:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s4a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.3\\)wc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20.4\\)sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7.4\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8.3\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)xi8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2i:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)cz3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)ys:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ew4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(27\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4.3\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14.5\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17\\)zd3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)dd3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(9\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23f\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(24\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)db2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19.3\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(3i\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.51:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.39:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13.4\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2pi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(9.4\\)da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:4.1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.42:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(16\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0ev:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24.2\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)eb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(26\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)e7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mx1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17\\)a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(3d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sv2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(3.4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(15\\)bc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7.7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(3e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(24\\)sv1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2.2\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.1.132:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.26:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(17\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ia:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2sa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(7\\)ca:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(18\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18f\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)w5\\(19c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)w5\\(21\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(7\\)db1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(05\\)wc8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(4.2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(4.3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(8\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1ca:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(19\\)gs0.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(16\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)st1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)w5\\(22b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25.4\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1.3\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-30b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.4\\)wc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)fc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14.5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)e7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(26\\)eb1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)eb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)e12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)dx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ya2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)da1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10g\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16\\)b1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\)ec3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xy6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xs2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xu1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.02\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17f\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(19\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(29a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(26\\)sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(12b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)yc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(19\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw3a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(5\\)ca1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t0a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16\\)bx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18.2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)by2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(24\\)sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(31\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)yb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(17\\)bt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(18\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11b\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(14\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2wa4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(7\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18g\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)t8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5f\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.43:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.44:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(18\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)cx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)e12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xg5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)dc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xm4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)ze:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10.5\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)so4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ewa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)by:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(15\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.45:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:p7:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p4:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:p6:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p7:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8.9\\)sa6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26\\)p2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(22b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(9\\)ia:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5\\(31a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.4\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)dc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(27b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1sec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5a\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1.1\\)pi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10\\)da4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)e8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)ex4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23.6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)bc3c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1.4\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23\\)sw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(28c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16f\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)ea6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(17\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)w5\\(20\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2x:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:8.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)eo1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.48:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.40:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.49:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ev01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2h:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)xr2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(30\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsd:bsd:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ya1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xe4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:midnightbsd:midnightbsd:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(19a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(2\\)xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)cc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2wa3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(14\\)gs2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(x\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(8\\)db2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3wa4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)ca4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2gs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(19a\\)gs6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s3b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(22a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(28a\\)ct:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(28a\\)ia:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(23a\\)bc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)w5\\(22b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)wx5\\(15a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)dc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(23\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5-27d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.3\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)e5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10.5\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(16\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ya:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yh3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xr2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xz7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)ja1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yx1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14.5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)db1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xt3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea2b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)sl1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yp1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yi1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)e8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12i\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12m\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.02\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(21b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7.4\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2jx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16.1\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17a\\)sxa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1b\\)da1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)bc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2eu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zl1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)sv1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(27\\)sv1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xw1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(12e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(3.3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)cc4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(11b\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(18.4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(15b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xu2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)tpc11a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(1a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6f\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(16\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5\\)b1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:8.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.41:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.32:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.47:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.46:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ex2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)aa1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5e\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)ea1e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xp4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1.1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)mc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13.03\\)b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15.1\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16.5\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23\\)sv1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(26b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(26\\)sv1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2f:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7\\)da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p10:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:p2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:0.4_1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p5:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:trustedbsd:trustedbsd:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:4.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:catalyst_blade_switch_3020_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "12.2\\(50\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:catalyst_blade_switch_3120_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "12.2\\(50\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:catalyst_blade_switch_3120x_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "12.2\\(50\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-4609", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-16", }, { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "[dailydave] 20081002 TCP Resource Exhaustion DoS Attack Speculation", refsource: "MLIST", tags: [ "Broken Link", ], url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { name: "http://www.outpost24.com/news/news-2008-10-02.html", refsource: "MISC", tags: [ "Broken Link", ], url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { name: "20081017 Cisco Response to Outpost24 TCP State Table Manipulation Denial of Service Vulnerabilities", refsource: "CISCO", tags: [ "Broken Link", ], url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { name: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", refsource: "MISC", tags: [ "Broken Link", ], url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { name: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", refsource: "MISC", tags: [ "Broken Link", ], url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { name: "http://insecure.org/stf/tcp-dos-attack-explained.html", refsource: "MISC", tags: [ "Broken Link", ], url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { name: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", refsource: "MISC", tags: [ "Broken Link", ], url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { name: "20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products", refsource: "CISCO", tags: [ "Broken Link", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { name: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", refsource: "MISC", tags: [ "Broken Link", ], url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { name: "TA09-251A", refsource: "CERT", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, { name: "HPSBMI02473", refsource: "HP", tags: [ "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { name: "MDVSA-2013:150", refsource: "MANDRIVA", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { name: "oval:org.mitre.oval:def:6340", refsource: "OVAL", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { name: "MS09-048", refsource: "MS", tags: [ "Patch", "Third Party Advisory", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, }, lastModifiedDate: "2022-12-14T16:40Z", publishedDate: "2008-10-20T17:59Z", }, }, }
ghsa-vf4j-pjcc-qf79
Vulnerability from github
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
{ affected: [], aliases: [ "CVE-2008-4609", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2008-10-20T17:59:00Z", severity: "HIGH", }, details: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", id: "GHSA-vf4j-pjcc-qf79", modified: "2022-05-13T01:09:05Z", published: "2022-05-13T01:09:05Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-4609", }, { type: "WEB", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { type: "WEB", url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { type: "WEB", url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { type: "WEB", url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { type: "WEB", url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { type: "WEB", url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { type: "WEB", url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { type: "WEB", url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { type: "WEB", url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { type: "WEB", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { type: "WEB", url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { type: "WEB", url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { type: "WEB", url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, ], schema_version: "1.4.0", severity: [], }
fkie_cve-2008-4609
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
bsd | bsd | - | |
bsd | bsd | 4.1 | |
bsd | bsd | 4.2 | |
bsd | bsd | 4.3 | |
bsd | bsd | 4.4 | |
bsdi | bsd_os | - | |
bsdi | bsd_os | 1.1 | |
bsdi | bsd_os | 2.0 | |
bsdi | bsd_os | 2.0.1 | |
bsdi | bsd_os | 2.1 | |
bsdi | bsd_os | 3.0 | |
bsdi | bsd_os | 3.1 | |
bsdi | bsd_os | 3.2 | |
bsdi | bsd_os | 4.0 | |
bsdi | bsd_os | 4.0.1 | |
bsdi | bsd_os | 4.1 | |
bsdi | bsd_os | 4.2 | |
cisco | ios | - | |
cisco | ios | 4.1 | |
cisco | ios | 4.1.1 | |
cisco | ios | 4.1.2 | |
cisco | ios | 8.2 | |
cisco | ios | 8.3 | |
cisco | ios | 9.0 | |
cisco | ios | 9.1 | |
cisco | ios | 9.14 | |
cisco | ios | 10.0 | |
cisco | ios | 10.3 | |
cisco | ios | 10.3\(3.3\) | |
cisco | ios | 10.3\(3.4\) | |
cisco | ios | 10.3\(4.2\) | |
cisco | ios | 10.3\(4.3\) | |
cisco | ios | 10.3\(16\) | |
cisco | ios | 10.3\(19a\) | |
cisco | ios | 11 | |
cisco | ios | 11.0 | |
cisco | ios | 11.0\(12\) | |
cisco | ios | 11.0\(17\) | |
cisco | ios | 11.0\(17\)bt | |
cisco | ios | 11.0\(18\) | |
cisco | ios | 11.0\(20.3\) | |
cisco | ios | 11.0\(22a\) | |
cisco | ios | 11.0\(22b\) | |
cisco | ios | 11.0\(x\) | |
cisco | ios | 11.0.12\(a\)bt | |
cisco | ios | 11.1 | |
cisco | ios | 11.1\(5\) | |
cisco | ios | 11.1\(7\) | |
cisco | ios | 11.1\(7\)aa | |
cisco | ios | 11.1\(7\)ca | |
cisco | ios | 11.1\(9\)ia | |
cisco | ios | 11.1\(11\) | |
cisco | ios | 11.1\(12\) | |
cisco | ios | 11.1\(13\) | |
cisco | ios | 11.1\(13\)aa | |
cisco | ios | 11.1\(13\)ca | |
cisco | ios | 11.1\(13\)ia | |
cisco | ios | 11.1\(14\) | |
cisco | ios | 11.1\(15\) | |
cisco | ios | 11.1\(15\)aa | |
cisco | ios | 11.1\(15\)ca | |
cisco | ios | 11.1\(15\)ia | |
cisco | ios | 11.1\(16\) | |
cisco | ios | 11.1\(16\)aa | |
cisco | ios | 11.1\(16\)ia | |
cisco | ios | 11.1\(17\) | |
cisco | ios | 11.1\(17\)cc | |
cisco | ios | 11.1\(17\)ct | |
cisco | ios | 11.1\(18\) | |
cisco | ios | 11.1\(20\)aa4 | |
cisco | ios | 11.1\(22\) | |
cisco | ios | 11.1\(24\) | |
cisco | ios | 11.1\(24a\) | |
cisco | ios | 11.1\(24b\) | |
cisco | ios | 11.1\(24c\) | |
cisco | ios | 11.1\(28a\)ct | |
cisco | ios | 11.1\(28a\)ia | |
cisco | ios | 11.1\(36\)ca2 | |
cisco | ios | 11.1\(36\)ca4 | |
cisco | ios | 11.1\(36\)cc2 | |
cisco | ios | 11.1\(36\)cc4 | |
cisco | ios | 11.1aa | |
cisco | ios | 11.1ca | |
cisco | ios | 11.1cc | |
cisco | ios | 11.1ct | |
cisco | ios | 11.1ia | |
cisco | ios | 11.2 | |
cisco | ios | 11.2\(4\) | |
cisco | ios | 11.2\(4\)f | |
cisco | ios | 11.2\(4\)f1 | |
cisco | ios | 11.2\(4\)xa | |
cisco | ios | 11.2\(4\)xaf | |
cisco | ios | 11.2\(8\) | |
cisco | ios | 11.2\(8\)p | |
cisco | ios | 11.2\(8\)sa1 | |
cisco | ios | 11.2\(8\)sa3 | |
cisco | ios | 11.2\(8\)sa5 | |
cisco | ios | 11.2\(8.2\)sa6 | |
cisco | ios | 11.2\(8.9\)sa6 | |
cisco | ios | 11.2\(9\)p | |
cisco | ios | 11.2\(9\)xa | |
cisco | ios | 11.2\(10\) | |
cisco | ios | 11.2\(10\)bc | |
cisco | ios | 11.2\(11\) | |
cisco | ios | 11.2\(11b\)t2 | |
cisco | ios | 11.2\(14\)gs2 | |
cisco | ios | 11.2\(15\)g | |
cisco | ios | 11.2\(15a\)p | |
cisco | ios | 11.2\(15b\) | |
cisco | ios | 11.2\(16\) | |
cisco | ios | 11.2\(16\)p | |
cisco | ios | 11.2\(17\) | |
cisco | ios | 11.2\(18\) | |
cisco | ios | 11.2\(19\)gs0.2 | |
cisco | ios | 11.2\(19a\)gs6 | |
cisco | ios | 11.2\(23a\)bc1 | |
cisco | ios | 11.2\(26\)p2 | |
cisco | ios | 11.2\(26\)p5 | |
cisco | ios | 11.2\(26a\) | |
cisco | ios | 11.2\(26b\) | |
cisco | ios | 11.2\(26e\) | |
cisco | ios | 11.2bc | |
cisco | ios | 11.2f | |
cisco | ios | 11.2gs | |
cisco | ios | 11.2p | |
cisco | ios | 11.2sa | |
cisco | ios | 11.2wa3 | |
cisco | ios | 11.2wa4 | |
cisco | ios | 11.2xa | |
cisco | ios | 11.3 | |
cisco | ios | 11.3\(1\) | |
cisco | ios | 11.3\(1\)ed | |
cisco | ios | 11.3\(1\)t | |
cisco | ios | 11.3\(2\)xa | |
cisco | ios | 11.3\(7\)db1 | |
cisco | ios | 11.3\(8\)db2 | |
cisco | ios | 11.3\(8\)t1 | |
cisco | ios | 11.3\(11\)b | |
cisco | ios | 11.3\(11b\) | |
cisco | ios | 11.3\(11b\)t2 | |
cisco | ios | 11.3\(11c\) | |
cisco | ios | 11.3\(11d\) | |
cisco | ios | 11.3aa | |
cisco | ios | 11.3da | |
cisco | ios | 11.3db | |
cisco | ios | 11.3ha | |
cisco | ios | 11.3ma | |
cisco | ios | 11.3na | |
cisco | ios | 11.3t | |
cisco | ios | 11.3wa4 | |
cisco | ios | 11.3xa | |
cisco | ios | 12.0 | |
cisco | ios | 12.0\(1\) | |
cisco | ios | 12.0\(1\)s | |
cisco | ios | 12.0\(1\)st | |
cisco | ios | 12.0\(1\)w | |
cisco | ios | 12.0\(1\)xa3 | |
cisco | ios | 12.0\(1\)xb | |
cisco | ios | 12.0\(1\)xe | |
cisco | ios | 12.0\(2\) | |
cisco | ios | 12.0\(2\)xc | |
cisco | ios | 12.0\(2\)xd | |
cisco | ios | 12.0\(2\)xe | |
cisco | ios | 12.0\(2\)xf | |
cisco | ios | 12.0\(2\)xg | |
cisco | ios | 12.0\(2a\) | |
cisco | ios | 12.0\(2b\) | |
cisco | ios | 12.0\(3\) | |
cisco | ios | 12.0\(3\)t2 | |
cisco | ios | 12.0\(3\)xe | |
cisco | ios | 12.0\(3.2\) | |
cisco | ios | 12.0\(3.3\)s | |
cisco | ios | 12.0\(3.4\)t | |
cisco | ios | 12.0\(3.6\)w5\(9.0.5\) | |
cisco | ios | 12.0\(3d\) | |
cisco | ios | 12.0\(4\) | |
cisco | ios | 12.0\(4\)s | |
cisco | ios | 12.0\(4\)t | |
cisco | ios | 12.0\(4\)xe | |
cisco | ios | 12.0\(4\)xe1 | |
cisco | ios | 12.0\(4\)xm | |
cisco | ios | 12.0\(4\)xm1 | |
cisco | ios | 12.0\(5\) | |
cisco | ios | 12.0\(5\)s | |
cisco | ios | 12.0\(5\)t | |
cisco | ios | 12.0\(5\)t1 | |
cisco | ios | 12.0\(5\)t2 | |
cisco | ios | 12.0\(5\)wc | |
cisco | ios | 12.0\(5\)wc2 | |
cisco | ios | 12.0\(5\)wc2b | |
cisco | ios | 12.0\(5\)wc3 | |
cisco | ios | 12.0\(5\)wc3b | |
cisco | ios | 12.0\(5\)wc5a | |
cisco | ios | 12.0\(05\)wc8 | |
cisco | ios | 12.0\(5\)wc9 | |
cisco | ios | 12.0\(5\)wc9a | |
cisco | ios | 12.0\(5\)wc11 | |
cisco | ios | 12.0\(5\)wc13 | |
cisco | ios | 12.0\(5\)wx | |
cisco | ios | 12.0\(5\)xe | |
cisco | ios | 12.0\(5\)xk | |
cisco | ios | 12.0\(5\)xk2 | |
cisco | ios | 12.0\(5\)xn | |
cisco | ios | 12.0\(5\)xn1 | |
cisco | ios | 12.0\(5\)xs | |
cisco | ios | 12.0\(5\)xu | |
cisco | ios | 12.0\(5\)yb4 | |
cisco | ios | 12.0\(5.1\)xp | |
cisco | ios | 12.0\(5.2\)xu | |
cisco | ios | 12.0\(5.3\)wc1 | |
cisco | ios | 12.0\(5.4\)wc1 | |
cisco | ios | 12.0\(5a\)e | |
cisco | ios | 12.0\(6\) | |
cisco | ios | 12.0\(6b\) | |
cisco | ios | 12.0\(7\)db2 | |
cisco | ios | 12.0\(7\)dc1 | |
cisco | ios | 12.0\(7\)s1 | |
cisco | ios | 12.0\(7\)sc | |
cisco | ios | 12.0\(7\)t | |
cisco | ios | 12.0\(7\)t2 | |
cisco | ios | 12.0\(7\)t3 | |
cisco | ios | 12.0\(7\)wx5\(15a\) | |
cisco | ios | 12.0\(7\)xe | |
cisco | ios | 12.0\(7\)xe2 | |
cisco | ios | 12.0\(7\)xf | |
cisco | ios | 12.0\(7\)xf1 | |
cisco | ios | 12.0\(7\)xk | |
cisco | ios | 12.0\(7\)xk2 | |
cisco | ios | 12.0\(7\)xk3 | |
cisco | ios | 12.0\(7\)xv | |
cisco | ios | 12.0\(7.4\)s | |
cisco | ios | 12.0\(7a\) | |
cisco | ios | 12.0\(8\) | |
cisco | ios | 12.0\(8\)s1 | |
cisco | ios | 12.0\(8.0.2\)s | |
cisco | ios | 12.0\(8.3\)sc | |
cisco | ios | 12.0\(8a\) | |
cisco | ios | 12.0\(9\) | |
cisco | ios | 12.0\(9\)s | |
cisco | ios | 12.0\(9\)s8 | |
cisco | ios | 12.0\(9a\) | |
cisco | ios | 12.0\(10\) | |
cisco | ios | 12.0\(10\)s3b | |
cisco | ios | 12.0\(10\)s7 | |
cisco | ios | 12.0\(10\)s8 | |
cisco | ios | 12.0\(10\)w5 | |
cisco | ios | 12.0\(10\)w5\(18f\) | |
cisco | ios | 12.0\(10\)w5\(18g\) | |
cisco | ios | 12.0\(10a\) | |
cisco | ios | 12.0\(11\)s6 | |
cisco | ios | 12.0\(11\)st4 | |
cisco | ios | 12.0\(11a\) | |
cisco | ios | 12.0\(12\) | |
cisco | ios | 12.0\(12\)s3 | |
cisco | ios | 12.0\(12\)s4 | |
cisco | ios | 12.0\(12a\) | |
cisco | ios | 12.0\(13\)s6 | |
cisco | ios | 12.0\(13\)s8 | |
cisco | ios | 12.0\(13\)w5\(19c\) | |
cisco | ios | 12.0\(13\)wt6\(1\) | |
cisco | ios | 12.0\(13a\) | |
cisco | ios | 12.0\(14\) | |
cisco | ios | 12.0\(14\)s7 | |
cisco | ios | 12.0\(14\)s8 | |
cisco | ios | 12.0\(14\)st | |
cisco | ios | 12.0\(14\)st3 | |
cisco | ios | 12.0\(14\)w5\(20\) | |
cisco | ios | 12.0\(14a\) | |
cisco | ios | 12.0\(15\)s | |
cisco | ios | 12.0\(15\)s3 | |
cisco | ios | 12.0\(15\)s6 | |
cisco | ios | 12.0\(15\)s7 | |
cisco | ios | 12.0\(15\)sc | |
cisco | ios | 12.0\(15\)sl | |
cisco | ios | 12.0\(15a\) | |
cisco | ios | 12.0\(16\)s | |
cisco | ios | 12.0\(16\)s8 | |
cisco | ios | 12.0\(16\)s8a | |
cisco | ios | 12.0\(16\)s10 | |
cisco | ios | 12.0\(16\)sc | |
cisco | ios | 12.0\(16\)sc3 | |
cisco | ios | 12.0\(16\)st | |
cisco | ios | 12.0\(16\)st1 | |
cisco | ios | 12.0\(16\)w5\(21\) | |
cisco | ios | 12.0\(16.06\)s | |
cisco | ios | 12.0\(16a\) | |
cisco | ios | 12.0\(17\) | |
cisco | ios | 12.0\(17\)s | |
cisco | ios | 12.0\(17\)s4 | |
cisco | ios | 12.0\(17\)s7 | |
cisco | ios | 12.0\(17\)sl | |
cisco | ios | 12.0\(17\)sl2 | |
cisco | ios | 12.0\(17\)sl6 | |
cisco | ios | 12.0\(17\)sl9 | |
cisco | ios | 12.0\(17\)st1 | |
cisco | ios | 12.0\(17\)st5 | |
cisco | ios | 12.0\(17\)st8 | |
cisco | ios | 12.0\(17a\) | |
cisco | ios | 12.0\(18\)s | |
cisco | ios | 12.0\(18\)s5 | |
cisco | ios | 12.0\(18\)s5a | |
cisco | ios | 12.0\(18\)s7 | |
cisco | ios | 12.0\(18\)sl | |
cisco | ios | 12.0\(18\)st1 | |
cisco | ios | 12.0\(18\)w5\(22b\) | |
cisco | ios | 12.0\(18b\) | |
cisco | ios | 12.0\(19\) | |
cisco | ios | 12.0\(19\)s | |
cisco | ios | 12.0\(19\)s2 | |
cisco | ios | 12.0\(19\)s2a | |
cisco | ios | 12.0\(19\)s4 | |
cisco | ios | 12.0\(19\)sl | |
cisco | ios | 12.0\(19\)sl4 | |
cisco | ios | 12.0\(19\)sp | |
cisco | ios | 12.0\(19\)st | |
cisco | ios | 12.0\(19\)st2 | |
cisco | ios | 12.0\(19\)st6 | |
cisco | ios | 12.0\(19a\) | |
cisco | ios | 12.0\(20\)sl | |
cisco | ios | 12.0\(20\)sp | |
cisco | ios | 12.0\(20\)sp1 | |
cisco | ios | 12.0\(20\)st2 | |
cisco | ios | 12.0\(20\)st6 | |
cisco | ios | 12.0\(20\)st7 | |
cisco | ios | 12.0\(20\)sx | |
cisco | ios | 12.0\(20\)w5\(22b\) | |
cisco | ios | 12.0\(20.4\)sp | |
cisco | ios | 12.0\(20a\) | |
cisco | ios | 12.0\(21\)s | |
cisco | ios | 12.0\(21\)s1 | |
cisco | ios | 12.0\(21\)s3 | |
cisco | ios | 12.0\(21\)s4a | |
cisco | ios | 12.0\(21\)s5a | |
cisco | ios | 12.0\(21\)s6 | |
cisco | ios | 12.0\(21\)s7 | |
cisco | ios | 12.0\(21\)sl | |
cisco | ios | 12.0\(21\)st | |
cisco | ios | 12.0\(21\)st6 | |
cisco | ios | 12.0\(21\)st7 | |
cisco | ios | 12.0\(21\)sx | |
cisco | ios | 12.0\(21a\) | |
cisco | ios | 12.0\(22\)s | |
cisco | ios | 12.0\(22\)s4 | |
cisco | ios | 12.0\(22\)s5 | |
cisco | ios | 12.0\(22\)sy | |
cisco | ios | 12.0\(23\)s2 | |
cisco | ios | 12.0\(23\)s3 | |
cisco | ios | 12.0\(23\)s4 | |
cisco | ios | 12.0\(23\)s5 | |
cisco | ios | 12.0\(23\)s6 | |
cisco | ios | 12.0\(23\)sx | |
cisco | ios | 12.0\(23\)sz | |
cisco | ios | 12.0\(24\)s1 | |
cisco | ios | 12.0\(24\)s2 | |
cisco | ios | 12.0\(24\)s4 | |
cisco | ios | 12.0\(24\)s5 | |
cisco | ios | 12.0\(24\)s6 | |
cisco | ios | 12.0\(24.2\)s | |
cisco | ios | 12.0\(25\)s1 | |
cisco | ios | 12.0\(25\)w5\(27\) | |
cisco | ios | 12.0\(25\)w5\(27c\) | |
cisco | ios | 12.0\(25\)w5-27d | |
cisco | ios | 12.0\(25.4\)s1 | |
cisco | ios | 12.0\(26\) | |
cisco | ios | 12.0\(26\)s | |
cisco | ios | 12.0\(26\)s1 | |
cisco | ios | 12.0\(26\)s2 | |
cisco | ios | 12.0\(26\)s6 | |
cisco | ios | 12.0\(26\)w5\(28\) | |
cisco | ios | 12.0\(26\)w5\(28a\) | |
cisco | ios | 12.0\(27\) | |
cisco | ios | 12.0\(27\)s | |
cisco | ios | 12.0\(27\)s1 | |
cisco | ios | 12.0\(27\)sv | |
cisco | ios | 12.0\(27\)sv1 | |
cisco | ios | 12.0\(27\)sv2 | |
cisco | ios | 12.0\(28\) | |
cisco | ios | 12.0\(28\)s3 | |
cisco | ios | 12.0\(28\)s5 | |
cisco | ios | 12.0\(28\)w5\(31a\) | |
cisco | ios | 12.0\(28\)w5-30b | |
cisco | ios | 12.0\(28\)w5-32a | |
cisco | ios | 12.0\(28c\) | |
cisco | ios | 12.0\(28d\) | |
cisco | ios | 12.0\(30\)s1 | |
cisco | ios | 12.0\(30\)s2 | |
cisco | ios | 12.0\(30\)s4 | |
cisco | ios | 12.0\(31\)s | |
cisco | ios | 12.0\(31\)s1 | |
cisco | ios | 12.0da | |
cisco | ios | 12.0db | |
cisco | ios | 12.0dc | |
cisco | ios | 12.0ev | |
cisco | ios | 12.0s | |
cisco | ios | 12.0sc | |
cisco | ios | 12.0sl | |
cisco | ios | 12.0sp | |
cisco | ios | 12.0st | |
cisco | ios | 12.0sv | |
cisco | ios | 12.0sx | |
cisco | ios | 12.0sy | |
cisco | ios | 12.0sz | |
cisco | ios | 12.0t | |
cisco | ios | 12.0w5 | |
cisco | ios | 12.0wc | |
cisco | ios | 12.0wt | |
cisco | ios | 12.0wx | |
cisco | ios | 12.0xa | |
cisco | ios | 12.0xb | |
cisco | ios | 12.0xc | |
cisco | ios | 12.0xd | |
cisco | ios | 12.0xe | |
cisco | ios | 12.0xf | |
cisco | ios | 12.0xg | |
cisco | ios | 12.0xh | |
cisco | ios | 12.0xi | |
cisco | ios | 12.0xj | |
cisco | ios | 12.0xk | |
cisco | ios | 12.0xl | |
cisco | ios | 12.0xm | |
cisco | ios | 12.0xn | |
cisco | ios | 12.0xp | |
cisco | ios | 12.0xq | |
cisco | ios | 12.0xr | |
cisco | ios | 12.0xs | |
cisco | ios | 12.0xt | |
cisco | ios | 12.0xu | |
cisco | ios | 12.0xv | |
cisco | ios | 12.0xw | |
cisco | ios | 12.1 | |
cisco | ios | 12.1\(1\) | |
cisco | ios | 12.1\(1\)db | |
cisco | ios | 12.1\(1\)db2 | |
cisco | ios | 12.1\(1\)dc | |
cisco | ios | 12.1\(1\)dc2 | |
cisco | ios | 12.1\(1\)e5 | |
cisco | ios | 12.1\(1\)ex | |
cisco | ios | 12.1\(1\)t | |
cisco | ios | 12.1\(1.3\)t | |
cisco | ios | 12.1\(1a\)t1 | |
cisco | ios | 12.1\(1c\) | |
cisco | ios | 12.1\(2\)e1 | |
cisco | ios | 12.1\(2\)t | |
cisco | ios | 12.1\(2\)xf | |
cisco | ios | 12.1\(2\)xf4 | |
cisco | ios | 12.1\(2\)xf5 | |
cisco | ios | 12.1\(2b\) | |
cisco | ios | 12.1\(3\) | |
cisco | ios | 12.1\(3\)db1 | |
cisco | ios | 12.1\(3\)dc2 | |
cisco | ios | 12.1\(3\)t | |
cisco | ios | 12.1\(3\)xi | |
cisco | ios | 12.1\(3\)xp | |
cisco | ios | 12.1\(3\)xp4 | |
cisco | ios | 12.1\(3\)xq | |
cisco | ios | 12.1\(3\)xt | |
cisco | ios | 12.1\(3\)xt3 | |
cisco | ios | 12.1\(3a\) | |
cisco | ios | 12.1\(3a\)e7 | |
cisco | ios | 12.1\(3a\)e8 | |
cisco | ios | 12.1\(3a\)t4 | |
cisco | ios | 12.1\(3a\)t7 | |
cisco | ios | 12.1\(3a\)xi8 | |
cisco | ios | 12.1\(3b\) | |
cisco | ios | 12.1\(4\) | |
cisco | ios | 12.1\(4\)db | |
cisco | ios | 12.1\(4\)db1 | |
cisco | ios | 12.1\(4\)db2 | |
cisco | ios | 12.1\(4\)dc | |
cisco | ios | 12.1\(4\)dc2 | |
cisco | ios | 12.1\(4\)e3 | |
cisco | ios | 12.1\(4\)ea1e | |
cisco | ios | 12.1\(4\)xm4 | |
cisco | ios | 12.1\(4\)xz | |
cisco | ios | 12.1\(4\)xz7 | |
cisco | ios | 12.1\(4.3\)t | |
cisco | ios | 12.1\(4a\) | |
cisco | ios | 12.1\(5\)da1 | |
cisco | ios | 12.1\(5\)db1 | |
cisco | ios | 12.1\(5\)dc | |
cisco | ios | 12.1\(5\)dc2 | |
cisco | ios | 12.1\(5\)ey | |
cisco | ios | 12.1\(5\)t | |
cisco | ios | 12.1\(5\)t9 | |
cisco | ios | 12.1\(5\)t12 | |
cisco | ios | 12.1\(5\)t15 | |
cisco | ios | 12.1\(5\)xg5 | |
cisco | ios | 12.1\(5\)xm | |
cisco | ios | 12.1\(5\)xm4 | |
cisco | ios | 12.1\(5\)xm7 | |
cisco | ios | 12.1\(5\)xr2 | |
cisco | ios | 12.1\(5\)xs | |
cisco | ios | 12.1\(5\)xs2 | |
cisco | ios | 12.1\(5\)xu1 | |
cisco | ios | 12.1\(5\)xv | |
cisco | ios | 12.1\(5\)xv3 | |
cisco | ios | 12.1\(5\)xv4 | |
cisco | ios | 12.1\(5\)xv5 | |
cisco | ios | 12.1\(5\)xy6 | |
cisco | ios | 12.1\(5\)ya | |
cisco | ios | 12.1\(5\)ya2 | |
cisco | ios | 12.1\(5\)yb | |
cisco | ios | 12.1\(5\)yb4 | |
cisco | ios | 12.1\(5\)yb5 | |
cisco | ios | 12.1\(5\)yc | |
cisco | ios | 12.1\(5\)yc1 | |
cisco | ios | 12.1\(5\)yc2 | |
cisco | ios | 12.1\(5\)yd | |
cisco | ios | 12.1\(5\)yd2 | |
cisco | ios | 12.1\(5\)yd6 | |
cisco | ios | 12.1\(5\)yf | |
cisco | ios | 12.1\(5\)yf2 | |
cisco | ios | 12.1\(5\)yf4 | |
cisco | ios | 12.1\(5\)yh | |
cisco | ios | 12.1\(5\)yh3 | |
cisco | ios | 12.1\(5\)yi | |
cisco | ios | 12.1\(5\)yi1 | |
cisco | ios | 12.1\(5a\)e | |
cisco | ios | 12.1\(5c\) | |
cisco | ios | 12.1\(5c\)e12 | |
cisco | ios | 12.1\(5c\)ex | |
cisco | ios | 12.1\(5e\) | |
cisco | ios | 12.1\(6\) | |
cisco | ios | 12.1\(6\)e8 | |
cisco | ios | 12.1\(6\)e12 | |
cisco | ios | 12.1\(6\)ea1 | |
cisco | ios | 12.1\(6\)ea1a | |
cisco | ios | 12.1\(6\)ea2 | |
cisco | ios | 12.1\(6\)ea2a | |
cisco | ios | 12.1\(6\)ea2b | |
cisco | ios | 12.1\(6\)ea2c | |
cisco | ios | 12.1\(6\)ey | |
cisco | ios | 12.1\(6\)ez1 | |
cisco | ios | 12.1\(6\)ez2 | |
cisco | ios | 12.1\(6.5\) | |
cisco | ios | 12.1\(6.5\)ec3 | |
cisco | ios | 12.1\(6a\) | |
cisco | ios | 12.1\(7\) | |
cisco | ios | 12.1\(7\)cx | |
cisco | ios | 12.1\(7\)da2 | |
cisco | ios | 12.1\(7\)da3 | |
cisco | ios | 12.1\(7\)ec | |
cisco | ios | 12.1\(7a\)e6 | |
cisco | ios | 12.1\(7a\)ey | |
cisco | ios | 12.1\(7a\)ey3 | |
cisco | ios | 12.1\(7b\) | |
cisco | ios | 12.1\(8\) | |
cisco | ios | 12.1\(8\)aa1 | |
cisco | ios | 12.1\(8\)e | |
cisco | ios | 12.1\(8\)ea | |
cisco | ios | 12.1\(8\)ea1b | |
cisco | ios | 12.1\(8\)ea2b | |
cisco | ios | 12.1\(8a\)e | |
cisco | ios | 12.1\(8a\)ew | |
cisco | ios | 12.1\(8a\)ew1 | |
cisco | ios | 12.1\(8a\)ex | |
cisco | ios | 12.1\(8b\)e8 | |
cisco | ios | 12.1\(8b\)e9 | |
cisco | ios | 12.1\(8b\)e14 | |
cisco | ios | 12.1\(8b\)e15 | |
cisco | ios | 12.1\(8b\)e16 | |
cisco | ios | 12.1\(8b\)e18 | |
cisco | ios | 12.1\(8b\)e20 | |
cisco | ios | 12.1\(8b\)ex4 | |
cisco | ios | 12.1\(8c\) | |
cisco | ios | 12.1\(9\) | |
cisco | ios | 12.1\(9\)aa | |
cisco | ios | 12.1\(9\)e | |
cisco | ios | 12.1\(9\)e3 | |
cisco | ios | 12.1\(9\)ea | |
cisco | ios | 12.1\(9\)ex | |
cisco | ios | 12.1\(9\)ex3 | |
cisco | ios | 12.1\(9a\) | |
cisco | ios | 12.1\(10\) | |
cisco | ios | 12.1\(10\)aa | |
cisco | ios | 12.1\(10\)e | |
cisco | ios | 12.1\(10\)e4 | |
cisco | ios | 12.1\(10\)ec | |
cisco | ios | 12.1\(10\)ec1 | |
cisco | ios | 12.1\(10\)ex | |
cisco | ios | 12.1\(10\)ey | |
cisco | ios | 12.1\(10.5\)ec | |
cisco | ios | 12.1\(10a\) | |
cisco | ios | 12.1\(11\) | |
cisco | ios | 12.1\(11\)e | |
cisco | ios | 12.1\(11\)ea1 | |
cisco | ios | 12.1\(11\)ec | |
cisco | ios | 12.1\(11.5\)e | |
cisco | ios | 12.1\(11a\) | |
cisco | ios | 12.1\(11b\) | |
cisco | ios | 12.1\(11b\)e | |
cisco | ios | 12.1\(11b\)e12 | |
cisco | ios | 12.1\(11b\)e14 | |
cisco | ios | 12.1\(12\) | |
cisco | ios | 12.1\(12\)e | |
cisco | ios | 12.1\(12a\) | |
cisco | ios | 12.1\(12b\) | |
cisco | ios | 12.1\(12c\) | |
cisco | ios | 12.1\(12c\)e7 | |
cisco | ios | 12.1\(12c\)ec | |
cisco | ios | 12.1\(12c\)ev01 | |
cisco | ios | 12.1\(12c\)ew4 | |
cisco | ios | 12.1\(13\) | |
cisco | ios | 12.1\(13\)ay | |
cisco | ios | 12.1\(13\)e1 | |
cisco | ios | 12.1\(13\)e3 | |
cisco | ios | 12.1\(13\)e7 | |
cisco | ios | 12.1\(13\)e9 | |
cisco | ios | 12.1\(13\)e12 | |
cisco | ios | 12.1\(13\)e13 | |
cisco | ios | 12.1\(13\)e17 | |
cisco | ios | 12.1\(13\)ea1 | |
cisco | ios | 12.1\(13\)ea1c | |
cisco | ios | 12.1\(13\)ew | |
cisco | ios | 12.1\(13\)ew4 | |
cisco | ios | 12.1\(13\)ex2 | |
cisco | ios | 12.1\(13.4\)e | |
cisco | ios | 12.1\(14\) | |
cisco | ios | 12.1\(14\)e1 | |
cisco | ios | 12.1\(14\)e4 | |
cisco | ios | 12.1\(14\)e9 | |
cisco | ios | 12.1\(14\)e10 | |
cisco | ios | 12.1\(14\)ea1 | |
cisco | ios | 12.1\(14\)eb | |
cisco | ios | 12.1\(14.5\) | |
cisco | ios | 12.1\(15\)bc1 | |
cisco | ios | 12.1\(16\) | |
cisco | ios | 12.1\(18\) | |
cisco | ios | 12.1\(18.4\) | |
cisco | ios | 12.1\(19\) | |
cisco | ios | 12.1\(19\)e | |
cisco | ios | 12.1\(19\)e1 | |
cisco | ios | 12.1\(19\)e6 | |
cisco | ios | 12.1\(19\)ec | |
cisco | ios | 12.1\(19\)ew | |
cisco | ios | 12.1\(19\)ew3 | |
cisco | ios | 12.1\(19\)fc1 | |
cisco | ios | 12.1\(19.3\)e | |
cisco | ios | 12.1\(20\) | |
cisco | ios | 12.1\(20\)e | |
cisco | ios | 12.1\(20\)e1 | |
cisco | ios | 12.1\(20\)e2 | |
cisco | ios | 12.1\(20\)e3 | |
cisco | ios | 12.1\(20\)e5 | |
cisco | ios | 12.1\(20\)ea1 | |
cisco | ios | 12.1\(20\)ea1a | |
cisco | ios | 12.1\(20\)ec | |
cisco | ios | 12.1\(20\)ec1 | |
cisco | ios | 12.1\(20\)ec2 | |
cisco | ios | 12.1\(20\)eo | |
cisco | ios | 12.1\(20\)eo1 | |
cisco | ios | 12.1\(20\)eo3 | |
cisco | ios | 12.1\(20\)ew | |
cisco | ios | 12.1\(20\)ew1 | |
cisco | ios | 12.1\(20\)ew2 | |
cisco | ios | 12.1\(20\)ew4 | |
cisco | ios | 12.1\(22\) | |
cisco | ios | 12.1\(22\)e1 | |
cisco | ios | 12.1\(22\)e3 | |
cisco | ios | 12.1\(22\)ea3 | |
cisco | ios | 12.1\(22\)ea4 | |
cisco | ios | 12.1\(22\)ea4a | |
cisco | ios | 12.1\(22\)ea5a | |
cisco | ios | 12.1\(22\)ea6 | |
cisco | ios | 12.1\(22\)eb | |
cisco | ios | 12.1\(23\)e1 | |
cisco | ios | 12.1\(23\)e4 | |
cisco | ios | 12.1\(26\)e1 | |
cisco | ios | 12.1\(26\)e3 | |
cisco | ios | 12.1\(26\)eb1 | |
cisco | ios | 12.1\(27\) | |
cisco | ios | 12.1\(27b\) | |
cisco | ios | 12.1aa | |
cisco | ios | 12.1ax | |
cisco | ios | 12.1ay | |
cisco | ios | 12.1az | |
cisco | ios | 12.1cx | |
cisco | ios | 12.1da | |
cisco | ios | 12.1db | |
cisco | ios | 12.1dc | |
cisco | ios | 12.1e | |
cisco | ios | 12.1ea | |
cisco | ios | 12.1eb | |
cisco | ios | 12.1ec | |
cisco | ios | 12.1eo | |
cisco | ios | 12.1eu | |
cisco | ios | 12.1ev | |
cisco | ios | 12.1ew | |
cisco | ios | 12.1ex | |
cisco | ios | 12.1ey | |
cisco | ios | 12.1ez | |
cisco | ios | 12.1ga | |
cisco | ios | 12.1gb | |
cisco | ios | 12.1m | |
cisco | ios | 12.1s | |
cisco | ios | 12.1sec | |
cisco | ios | 12.1t | |
cisco | ios | 12.1x\(l\) | |
cisco | ios | 12.1xa | |
cisco | ios | 12.1xb | |
cisco | ios | 12.1xc | |
cisco | ios | 12.1xd | |
cisco | ios | 12.1xe | |
cisco | ios | 12.1xf | |
cisco | ios | 12.1xg | |
cisco | ios | 12.1xh | |
cisco | ios | 12.1xi | |
cisco | ios | 12.1xj | |
cisco | ios | 12.1xk | |
cisco | ios | 12.1xl | |
cisco | ios | 12.1xm | |
cisco | ios | 12.1xp | |
cisco | ios | 12.1xq | |
cisco | ios | 12.1xr | |
cisco | ios | 12.1xs | |
cisco | ios | 12.1xt | |
cisco | ios | 12.1xu | |
cisco | ios | 12.1xv | |
cisco | ios | 12.1xw | |
cisco | ios | 12.1xx | |
cisco | ios | 12.1xy | |
cisco | ios | 12.1xz | |
cisco | ios | 12.1ya | |
cisco | ios | 12.1yb | |
cisco | ios | 12.1yc | |
cisco | ios | 12.1yd | |
cisco | ios | 12.1ye | |
cisco | ios | 12.1yf | |
cisco | ios | 12.1yh | |
cisco | ios | 12.1yi | |
cisco | ios | 12.1yj | |
cisco | ios | 12.2 | |
cisco | ios | 12.2\(1\) | |
cisco | ios | 12.2\(1\)dx | |
cisco | ios | 12.2\(1\)s | |
cisco | ios | 12.2\(1\)t | |
cisco | ios | 12.2\(1\)xa | |
cisco | ios | 12.2\(1\)xd | |
cisco | ios | 12.2\(1\)xd1 | |
cisco | ios | 12.2\(1\)xd3 | |
cisco | ios | 12.2\(1\)xd4 | |
cisco | ios | 12.2\(1\)xe | |
cisco | ios | 12.2\(1\)xe2 | |
cisco | ios | 12.2\(1\)xe3 | |
cisco | ios | 12.2\(1\)xh | |
cisco | ios | 12.2\(1\)xq | |
cisco | ios | 12.2\(1\)xs | |
cisco | ios | 12.2\(1\)xs1 | |
cisco | ios | 12.2\(1.1\) | |
cisco | ios | 12.2\(1.1\)pi | |
cisco | ios | 12.2\(1.4\)s | |
cisco | ios | 12.2\(1b\) | |
cisco | ios | 12.2\(1b\)da1 | |
cisco | ios | 12.2\(1d\) | |
cisco | ios | 12.2\(2\)b | |
cisco | ios | 12.2\(2\)bx | |
cisco | ios | 12.2\(2\)by | |
cisco | ios | 12.2\(2\)by2 | |
cisco | ios | 12.2\(2\)dd3 | |
cisco | ios | 12.2\(2\)t | |
cisco | ios | 12.2\(2\)t1 | |
cisco | ios | 12.2\(2\)t4 | |
cisco | ios | 12.2\(2\)xa | |
cisco | ios | 12.2\(2\)xa1 | |
cisco | ios | 12.2\(2\)xa5 | |
cisco | ios | 12.2\(2\)xb | |
cisco | ios | 12.2\(2\)xb3 | |
cisco | ios | 12.2\(2\)xb4 | |
cisco | ios | 12.2\(2\)xb11 | |
cisco | ios | 12.2\(2\)xb14 | |
cisco | ios | 12.2\(2\)xb15 | |
cisco | ios | 12.2\(2\)xc1 | |
cisco | ios | 12.2\(2\)xf | |
cisco | ios | 12.2\(2\)xg | |
cisco | ios | 12.2\(2\)xh | |
cisco | ios | 12.2\(2\)xh2 | |
cisco | ios | 12.2\(2\)xh3 | |
cisco | ios | 12.2\(2\)xi | |
cisco | ios | 12.2\(2\)xi1 | |
cisco | ios | 12.2\(2\)xi2 | |
cisco | ios | 12.2\(2\)xj | |
cisco | ios | 12.2\(2\)xj1 | |
cisco | ios | 12.2\(2\)xk | |
cisco | ios | 12.2\(2\)xk2 | |
cisco | ios | 12.2\(2\)xn | |
cisco | ios | 12.2\(2\)xr | |
cisco | ios | 12.2\(2\)xt | |
cisco | ios | 12.2\(2\)xt3 | |
cisco | ios | 12.2\(2\)xu | |
cisco | ios | 12.2\(2\)xu2 | |
cisco | ios | 12.2\(2\)yc | |
cisco | ios | 12.2\(2.2\)t | |
cisco | ios | 12.2\(3\) | |
cisco | ios | 12.2\(3.4\)bp | |
cisco | ios | 12.2\(3d\) | |
cisco | ios | 12.2\(4\) | |
cisco | ios | 12.2\(4\)b | |
cisco | ios | 12.2\(4\)b1 | |
cisco | ios | 12.2\(4\)b2 | |
cisco | ios | 12.2\(4\)b3 | |
cisco | ios | 12.2\(4\)b4 | |
cisco | ios | 12.2\(4\)bc1 | |
cisco | ios | 12.2\(4\)bc1a | |
cisco | ios | 12.2\(4\)bx | |
cisco | ios | 12.2\(4\)ja | |
cisco | ios | 12.2\(4\)ja1 | |
cisco | ios | 12.2\(4\)mb3 | |
cisco | ios | 12.2\(4\)mb12 | |
cisco | ios | 12.2\(4\)mb13b | |
cisco | ios | 12.2\(4\)mb13c | |
cisco | ios | 12.2\(4\)mx | |
cisco | ios | 12.2\(4\)mx1 | |
cisco | ios | 12.2\(4\)t | |
cisco | ios | 12.2\(4\)t1 | |
cisco | ios | 12.2\(4\)t3 | |
cisco | ios | 12.2\(4\)t6 | |
cisco | ios | 12.2\(4\)xl | |
cisco | ios | 12.2\(4\)xl4 | |
cisco | ios | 12.2\(4\)xm | |
cisco | ios | 12.2\(4\)xm2 | |
cisco | ios | 12.2\(4\)xr | |
cisco | ios | 12.2\(4\)xw | |
cisco | ios | 12.2\(4\)xw1 | |
cisco | ios | 12.2\(4\)ya | |
cisco | ios | 12.2\(4\)ya1 | |
cisco | ios | 12.2\(4\)ya7 | |
cisco | ios | 12.2\(4\)ya8 | |
cisco | ios | 12.2\(4\)ya9 | |
cisco | ios | 12.2\(4\)ya10 | |
cisco | ios | 12.2\(4\)ya11 | |
cisco | ios | 12.2\(4\)yb | |
cisco | ios | 12.2\(5\) | |
cisco | ios | 12.2\(5\)ca1 | |
cisco | ios | 12.2\(5d\) | |
cisco | ios | 12.2\(6.8\)t0a | |
cisco | ios | 12.2\(6.8\)t1a | |
cisco | ios | 12.2\(6.8a\) | |
cisco | ios | 12.2\(6c\) | |
cisco | ios | 12.2\(7\) | |
cisco | ios | 12.2\(7\)da | |
cisco | ios | 12.2\(7.4\)s | |
cisco | ios | 12.2\(7a\) | |
cisco | ios | 12.2\(7b\) | |
cisco | ios | 12.2\(7c\) | |
cisco | ios | 12.2\(8\)bc1 | |
cisco | ios | 12.2\(8\)ja | |
cisco | ios | 12.2\(8\)t | |
cisco | ios | 12.2\(8\)t10 | |
cisco | ios | 12.2\(8\)tpc10a | |
cisco | ios | 12.2\(8\)yd | |
cisco | ios | 12.2\(8\)yw2 | |
cisco | ios | 12.2\(8\)yw3 | |
cisco | ios | 12.2\(8\)yy | |
cisco | ios | 12.2\(8\)yy3 | |
cisco | ios | 12.2\(8\)zb7 | |
cisco | ios | 12.2\(9\)s | |
cisco | ios | 12.2\(9.4\)da | |
cisco | ios | 12.2\(10\)da2 | |
cisco | ios | 12.2\(10\)da4 | |
cisco | ios | 12.2\(10.5\)s | |
cisco | ios | 12.2\(10g\) | |
cisco | ios | 12.2\(11\)bc3c | |
cisco | ios | 12.2\(11\)ja | |
cisco | ios | 12.2\(11\)ja1 | |
cisco | ios | 12.2\(11\)t | |
cisco | ios | 12.2\(11\)t2 | |
cisco | ios | 12.2\(11\)t3 | |
cisco | ios | 12.2\(11\)t8 | |
cisco | ios | 12.2\(11\)t9 | |
cisco | ios | 12.2\(11\)yp1 | |
cisco | ios | 12.2\(11\)yu | |
cisco | ios | 12.2\(11\)yv | |
cisco | ios | 12.2\(11\)yx1 | |
cisco | ios | 12.2\(11\)yz2 | |
cisco | ios | 12.2\(12\) | |
cisco | ios | 12.2\(12\)da3 | |
cisco | ios | 12.2\(12\)da8 | |
cisco | ios | 12.2\(12\)da9 | |
cisco | ios | 12.2\(12.02\)s | |
cisco | ios | 12.2\(12.02\)t | |
cisco | ios | 12.2\(12.05\) | |
cisco | ios | 12.2\(12.05\)s | |
cisco | ios | 12.2\(12.05\)t | |
cisco | ios | 12.2\(12b\) | |
cisco | ios | 12.2\(12c\) | |
cisco | ios | 12.2\(12g\) | |
cisco | ios | 12.2\(12h\) | |
cisco | ios | 12.2\(12i\) | |
cisco | ios | 12.2\(12m\) | |
cisco | ios | 12.2\(13\) | |
cisco | ios | 12.2\(13\)ja1 | |
cisco | ios | 12.2\(13\)mc1 | |
cisco | ios | 12.2\(13\)t | |
cisco | ios | 12.2\(13\)t1 | |
cisco | ios | 12.2\(13\)t9 | |
cisco | ios | 12.2\(13\)t14 | |
cisco | ios | 12.2\(13\)t16 | |
cisco | ios | 12.2\(13\)zc | |
cisco | ios | 12.2\(13\)zd | |
cisco | ios | 12.2\(13\)zd3 | |
cisco | ios | 12.2\(13\)zd4 | |
cisco | ios | 12.2\(13\)ze | |
cisco | ios | 12.2\(13\)zf | |
cisco | ios | 12.2\(13\)zg | |
cisco | ios | 12.2\(13\)zh | |
cisco | ios | 12.2\(13\)zh3 | |
cisco | ios | 12.2\(13\)zh8 | |
cisco | ios | 12.2\(13\)zj | |
cisco | ios | 12.2\(13\)zk | |
cisco | ios | 12.2\(13\)zl | |
cisco | ios | 12.2\(13.03\)b | |
cisco | ios | 12.2\(13a\) | |
cisco | ios | 12.2\(13e\) | |
cisco | ios | 12.2\(14\)s | |
cisco | ios | 12.2\(14\)s13 | |
cisco | ios | 12.2\(14\)s14 | |
cisco | ios | 12.2\(14\)s15 | |
cisco | ios | 12.2\(14\)su2 | |
cisco | ios | 12.2\(14\)sx1 | |
cisco | ios | 12.2\(14\)sy | |
cisco | ios | 12.2\(14\)sy1 | |
cisco | ios | 12.2\(14\)sy03 | |
cisco | ios | 12.2\(14\)sz | |
cisco | ios | 12.2\(14\)sz1 | |
cisco | ios | 12.2\(14\)sz2 | |
cisco | ios | 12.2\(14\)za | |
cisco | ios | 12.2\(14\)za2 | |
cisco | ios | 12.2\(14\)za8 | |
cisco | ios | 12.2\(14.5\) | |
cisco | ios | 12.2\(14.5\)t | |
cisco | ios | 12.2\(15\)b | |
cisco | ios | 12.2\(15\)bc | |
cisco | ios | 12.2\(15\)bc1 | |
cisco | ios | 12.2\(15\)bc1f | |
cisco | ios | 12.2\(15\)bc2f | |
cisco | ios | 12.2\(15\)bc2h | |
cisco | ios | 12.2\(15\)bc2i | |
cisco | ios | 12.2\(15\)bx | |
cisco | ios | 12.2\(15\)bz | |
cisco | ios | 12.2\(15\)cx | |
cisco | ios | 12.2\(15\)cz3 | |
cisco | ios | 12.2\(15\)jk2 | |
cisco | ios | 12.2\(15\)jk4 | |
cisco | ios | 12.2\(15\)jk5 | |
cisco | ios | 12.2\(15\)mc1 | |
cisco | ios | 12.2\(15\)mc2c | |
cisco | ios | 12.2\(15\)mc2e | |
cisco | ios | 12.2\(15\)sl1 | |
cisco | ios | 12.2\(15\)t | |
cisco | ios | 12.2\(15\)t5 | |
cisco | ios | 12.2\(15\)t7 | |
cisco | ios | 12.2\(15\)t8 | |
cisco | ios | 12.2\(15\)t9 | |
cisco | ios | 12.2\(15\)t15 | |
cisco | ios | 12.2\(15\)t16 | |
cisco | ios | 12.2\(15\)t17 | |
cisco | ios | 12.2\(15\)xr | |
cisco | ios | 12.2\(15\)xr2 | |
cisco | ios | 12.2\(15\)ys | |
cisco | ios | 12.2\(15\)ys_1.2\(1\) | |
cisco | ios | 12.2\(15\)zj | |
cisco | ios | 12.2\(15\)zj1 | |
cisco | ios | 12.2\(15\)zj2 | |
cisco | ios | 12.2\(15\)zj3 | |
cisco | ios | 12.2\(15\)zk | |
cisco | ios | 12.2\(15\)zl | |
cisco | ios | 12.2\(15\)zl1 | |
cisco | ios | 12.2\(15\)zn | |
cisco | ios | 12.2\(15\)zo | |
cisco | ios | 12.2\(15.1\)s | |
cisco | ios | 12.2\(16\)b | |
cisco | ios | 12.2\(16\)b1 | |
cisco | ios | 12.2\(16\)bx | |
cisco | ios | 12.2\(16.1\)b | |
cisco | ios | 12.2\(16.5\)s | |
cisco | ios | 12.2\(16f\) | |
cisco | ios | 12.2\(17\) | |
cisco | ios | 12.2\(17\)a | |
cisco | ios | 12.2\(17\)zd3 | |
cisco | ios | 12.2\(17a\) | |
cisco | ios | 12.2\(17a\)sxa | |
cisco | ios | 12.2\(17b\)sxa | |
cisco | ios | 12.2\(17d\) | |
cisco | ios | 12.2\(17d\)sx | |
cisco | ios | 12.2\(17d\)sxb | |
cisco | ios | 12.2\(17d\)sxb7 | |
cisco | ios | 12.2\(17d\)sxb8 | |
cisco | ios | 12.2\(17d\)sxb10 | |
cisco | ios | 12.2\(17f\) | |
cisco | ios | 12.2\(18\)ew | |
cisco | ios | 12.2\(18\)ew2 | |
cisco | ios | 12.2\(18\)ew3 | |
cisco | ios | 12.2\(18\)ew5 | |
cisco | ios | 12.2\(18\)ewa | |
cisco | ios | 12.2\(18\)s | |
cisco | ios | 12.2\(18\)s6 | |
cisco | ios | 12.2\(18\)s8 | |
cisco | ios | 12.2\(18\)s9 | |
cisco | ios | 12.2\(18\)s10 | |
cisco | ios | 12.2\(18\)se | |
cisco | ios | 12.2\(18\)so4 | |
cisco | ios | 12.2\(18\)sv | |
cisco | ios | 12.2\(18\)sv3 | |
cisco | ios | 12.2\(18\)sw | |
cisco | ios | 12.2\(18\)sxd1 | |
cisco | ios | 12.2\(18\)sxd4 | |
cisco | ios | 12.2\(18\)sxd5 | |
cisco | ios | 12.2\(18\)sxd6 | |
cisco | ios | 12.2\(18\)sxd7 | |
cisco | ios | 12.2\(18\)sxe | |
cisco | ios | 12.2\(18\)sxe1 | |
cisco | ios | 12.2\(18\)sxe3 | |
cisco | ios | 12.2\(18\)sxf | |
cisco | ios | 12.2\(18.2\) | |
cisco | ios | 12.2\(19\) | |
cisco | ios | 12.2\(19\)b | |
cisco | ios | 12.2\(20\)eu | |
cisco | ios | 12.2\(20\)eu1 | |
cisco | ios | 12.2\(20\)eu2 | |
cisco | ios | 12.2\(20\)ew | |
cisco | ios | 12.2\(20\)ew2 | |
cisco | ios | 12.2\(20\)ew3 | |
cisco | ios | 12.2\(20\)ewa | |
cisco | ios | 12.2\(20\)ewa2 | |
cisco | ios | 12.2\(20\)ewa3 | |
cisco | ios | 12.2\(20\)s | |
cisco | ios | 12.2\(20\)s1 | |
cisco | ios | 12.2\(20\)s2 | |
cisco | ios | 12.2\(20\)s4 | |
cisco | ios | 12.2\(20\)s7 | |
cisco | ios | 12.2\(20\)s8 | |
cisco | ios | 12.2\(20\)s9 | |
cisco | ios | 12.2\(20\)se3 | |
cisco | ios | 12.2\(21\) | |
cisco | ios | 12.2\(21a\) | |
cisco | ios | 12.2\(21b\) | |
cisco | ios | 12.2\(22\)ea6 | |
cisco | ios | 12.2\(22\)s | |
cisco | ios | 12.2\(22\)s2 | |
cisco | ios | 12.2\(22\)sv1 | |
cisco | ios | 12.2\(23\) | |
cisco | ios | 12.2\(23\)sv1 | |
cisco | ios | 12.2\(23\)sw | |
cisco | ios | 12.2\(23.6\) | |
cisco | ios | 12.2\(23a\) | |
cisco | ios | 12.2\(23f\) | |
cisco | ios | 12.2\(24\) | |
cisco | ios | 12.2\(24\)sv | |
cisco | ios | 12.2\(24\)sv1 | |
cisco | ios | 12.2\(25\)ewa | |
cisco | ios | 12.2\(25\)ewa1 | |
cisco | ios | 12.2\(25\)ewa3 | |
cisco | ios | 12.2\(25\)ewa4 | |
cisco | ios | 12.2\(25\)ex | |
cisco | ios | 12.2\(25\)ey | |
cisco | ios | 12.2\(25\)ey2 | |
cisco | ios | 12.2\(25\)ey3 | |
cisco | ios | 12.2\(25\)ez | |
cisco | ios | 12.2\(25\)ez1 | |
cisco | ios | 12.2\(25\)fx | |
cisco | ios | 12.2\(25\)fy | |
cisco | ios | 12.2\(25\)s | |
cisco | ios | 12.2\(25\)s1 | |
cisco | ios | 12.2\(25\)s3 | |
cisco | ios | 12.2\(25\)s4 | |
cisco | ios | 12.2\(25\)s6 | |
cisco | ios | 12.2\(25\)se | |
cisco | ios | 12.2\(25\)seb | |
cisco | ios | 12.2\(25\)seb2 | |
cisco | ios | 12.2\(25\)seb3 | |
cisco | ios | 12.2\(25\)seb4 | |
cisco | ios | 12.2\(25\)sec1 | |
cisco | ios | 12.2\(25\)sec2 | |
cisco | ios | 12.2\(25\)sed | |
cisco | ios | 12.2\(25\)sg | |
cisco | ios | 12.2\(25\)sv2 | |
cisco | ios | 12.2\(25\)sw | |
cisco | ios | 12.2\(25\)sw3a | |
cisco | ios | 12.2\(25\)sw4 | |
cisco | ios | 12.2\(25\)sw4a | |
cisco | ios | 12.2\(26\)sv | |
cisco | ios | 12.2\(26\)sv1 | |
cisco | ios | 12.2\(26b\) | |
cisco | ios | 12.2\(27\)sbc | |
cisco | ios | 12.2\(27\)sv1 | |
cisco | ios | 12.2\(27b\) | |
cisco | ios | 12.2\(28\) | |
cisco | ios | 12.2\(28c\) | |
cisco | ios | 12.2\(29a\) | |
cisco | ios | 12.2\(30\)s1 | |
cisco | ios | 12.2\(31\) | |
cisco | ios | 12.2b | |
cisco | ios | 12.2bc | |
cisco | ios | 12.2bw | |
cisco | ios | 12.2bx | |
cisco | ios | 12.2by | |
cisco | ios | 12.2bz | |
cisco | ios | 12.2ca | |
cisco | ios | 12.2cx | |
cisco | ios | 12.2cy | |
cisco | ios | 12.2cz | |
cisco | ios | 12.2da | |
cisco | ios | 12.2dd | |
cisco | ios | 12.2dx | |
cisco | ios | 12.2e | |
cisco | ios | 12.2eu | |
cisco | ios | 12.2ew | |
cisco | ios | 12.2ewa | |
cisco | ios | 12.2ex | |
cisco | ios | 12.2ey | |
cisco | ios | 12.2ez | |
cisco | ios | 12.2f | |
cisco | ios | 12.2fx | |
cisco | ios | 12.2fy | |
cisco | ios | 12.2ja | |
cisco | ios | 12.2jk | |
cisco | ios | 12.2jx | |
cisco | ios | 12.2mb | |
cisco | ios | 12.2mc | |
cisco | ios | 12.2mx | |
cisco | ios | 12.2n | |
cisco | ios | 12.2pb | |
cisco | ios | 12.2pi | |
cisco | ios | 12.2s | |
cisco | ios | 12.2sa | |
cisco | ios | 12.2sbc | |
cisco | ios | 12.2se | |
cisco | ios | 12.2sea | |
cisco | ios | 12.2seb | |
cisco | ios | 12.2sec | |
cisco | ios | 12.2sg | |
cisco | ios | 12.2sh | |
cisco | ios | 12.2so | |
cisco | ios | 12.2su | |
cisco | ios | 12.2sv | |
cisco | ios | 12.2sw | |
cisco | ios | 12.2sx | |
cisco | ios | 12.2sxa | |
cisco | ios | 12.2sxb | |
cisco | ios | 12.2sxd | |
cisco | ios | 12.2sxe | |
cisco | ios | 12.2sxf | |
cisco | ios | 12.2sy | |
cisco | ios | 12.2sz | |
cisco | ios | 12.2t | |
cisco | ios | 12.2tpc | |
cisco | ios | 12.2x | |
cisco | ios | 12.2xa | |
cisco | ios | 12.2xb | |
cisco | ios | 12.2xc | |
cisco | ios | 12.2xd | |
cisco | ios | 12.2xe | |
cisco | ios | 12.2xf | |
cisco | ios | 12.2xg | |
cisco | ios | 12.2xh | |
cisco | ios | 12.2xi | |
cisco | ios | 12.2xj | |
cisco | ios | 12.2xk | |
cisco | ios | 12.2xl | |
cisco | ios | 12.2xm | |
cisco | ios | 12.2xn | |
cisco | ios | 12.2xq | |
cisco | ios | 12.2xr | |
cisco | ios | 12.2xs | |
cisco | ios | 12.2xt | |
cisco | ios | 12.2xu | |
cisco | ios | 12.2xv | |
cisco | ios | 12.2xw | |
cisco | ios | 12.2xz | |
cisco | ios | 12.2ya | |
cisco | ios | 12.2yb | |
cisco | ios | 12.2yc | |
cisco | ios | 12.2yd | |
cisco | ios | 12.2ye | |
cisco | ios | 12.2yf | |
cisco | ios | 12.2yg | |
cisco | ios | 12.2yh | |
cisco | ios | 12.2yj | |
cisco | ios | 12.2yk | |
cisco | ios | 12.2yl | |
cisco | ios | 12.2ym | |
cisco | ios | 12.2yn | |
cisco | ios | 12.2yo | |
cisco | ios | 12.2yp | |
cisco | ios | 12.2yq | |
cisco | ios | 12.2yr | |
cisco | ios | 12.2ys | |
cisco | ios | 12.2yt | |
cisco | ios | 12.2yu | |
cisco | ios | 12.2yv | |
cisco | ios | 12.2yw | |
cisco | ios | 12.2yx | |
cisco | ios | 12.2yy | |
cisco | ios | 12.2yz | |
cisco | ios | 12.2za | |
cisco | ios | 12.2zb | |
cisco | ios | 12.2zc | |
cisco | ios | 12.2zd | |
cisco | ios | 12.2ze | |
cisco | ios | 12.2zf | |
cisco | ios | 12.2zg | |
cisco | ios | 12.2zh | |
cisco | ios | 12.2zi | |
cisco | ios | 12.2zj | |
cisco | ios | 12.2zk | |
cisco | ios | 12.2zl | |
cisco | ios | 12.2zm | |
cisco | ios | 12.2zn | |
cisco | ios | 12.2zo | |
cisco | ios | 12.2zp | |
cisco | ios | 12.2zq | |
cisco | ios | 12.3 | |
cisco | ios | 12.3\(1a\) | |
cisco | ios | 12.3\(2\)ja | |
cisco | ios | 12.3\(2\)ja5 | |
cisco | ios | 12.3\(2\)jk | |
cisco | ios | 12.3\(2\)jk1 | |
cisco | ios | 12.3\(2\)t3 | |
cisco | ios | 12.3\(2\)t8 | |
cisco | ios | 12.3\(2\)xa4 | |
cisco | ios | 12.3\(2\)xa5 | |
cisco | ios | 12.3\(2\)xc1 | |
cisco | ios | 12.3\(2\)xc2 | |
cisco | ios | 12.3\(2\)xc3 | |
cisco | ios | 12.3\(2\)xc4 | |
cisco | ios | 12.3\(2\)xe3 | |
cisco | ios | 12.3\(2\)xe4 | |
cisco | ios | 12.3\(3e\) | |
cisco | ios | 12.3\(3h\) | |
cisco | ios | 12.3\(3i\) | |
cisco | ios | 12.3\(4\)eo1 | |
cisco | ios | 12.3\(4\)ja | |
cisco | ios | 12.3\(4\)ja1 | |
cisco | ios | 12.3\(4\)t | |
cisco | ios | 12.3\(4\)t1 | |
cisco | ios | 12.3\(4\)t2 | |
cisco | ios | 12.3\(4\)t3 | |
cisco | ios | 12.3\(4\)t4 | |
cisco | ios | 12.3\(4\)t8 | |
cisco | ios | 12.3\(4\)tpc11a | |
cisco | ios | 12.3\(4\)xd | |
cisco | ios | 12.3\(4\)xd1 | |
cisco | ios | 12.3\(4\)xd2 | |
cisco | ios | 12.3\(4\)xe4 | |
cisco | ios | 12.3\(4\)xg1 | |
cisco | ios | 12.3\(4\)xg2 | |
cisco | ios | 12.3\(4\)xg4 | |
cisco | ios | 12.3\(4\)xg5 | |
cisco | ios | 12.3\(4\)xh | |
cisco | ios | 12.3\(4\)xk | |
cisco | ios | 12.3\(4\)xk1 | |
cisco | ios | 12.3\(4\)xk3 | |
cisco | ios | 12.3\(4\)xk4 | |
cisco | ios | 12.3\(4\)xq | |
cisco | ios | 12.3\(4\)xq1 | |
cisco | ios | 12.3\(5\) | |
cisco | ios | 12.3\(5\)b1 | |
cisco | ios | 12.3\(5a\) | |
cisco | ios | 12.3\(5a\)b | |
cisco | ios | 12.3\(5a\)b2 | |
cisco | ios | 12.3\(5a\)b5 | |
cisco | ios | 12.3\(5b\) | |
cisco | ios | 12.3\(5c\) | |
cisco | ios | 12.3\(5e\) | |
cisco | ios | 12.3\(5f\) | |
cisco | ios | 12.3\(6\) | |
cisco | ios | 12.3\(6a\) | |
cisco | ios | 12.3\(6d\) | |
cisco | ios | 12.3\(6e\) | |
cisco | ios | 12.3\(6f\) | |
cisco | ios | 12.3\(7\)ja | |
cisco | ios | 12.3\(7\)ja1 | |
cisco | ios | 12.3\(7\)jx | |
cisco | ios | 12.3\(7\)t | |
cisco | ios | 12.3\(7\)t4 | |
cisco | ios | 12.3\(7\)t8 | |
cisco | ios | 12.3\(7\)t9 | |
cisco | ios | 12.3\(7\)t10 | |
cisco | ios | 12.3\(7\)t12 | |
cisco | ios | 12.3\(7\)xi3 | |
cisco | ios | 12.3\(7\)xi4 | |
cisco | ios | 12.3\(7\)xi7 | |
cisco | ios | 12.3\(7\)xr3 | |
cisco | ios | 12.3\(7\)xr4 | |
cisco | ios | 12.3\(7\)xr6 | |
cisco | ios | 12.3\(7.7\) | |
cisco | ios | 12.3\(8\)ja | |
cisco | ios | 12.3\(8\)ja1 | |
cisco | ios | 12.3\(8\)t4 | |
cisco | ios | 12.3\(8\)t7 | |
cisco | ios | 12.3\(8\)t8 | |
cisco | ios | 12.3\(8\)t9 | |
cisco | ios | 12.3\(8\)t11 | |
cisco | ios | 12.3\(8\)xu2 | |
cisco | ios | 12.3\(8\)xy4 | |
cisco | ios | 12.3\(8\)xy5 | |
cisco | ios | 12.3\(8\)xy6 | |
cisco | ios | 12.3\(8\)ya1 | |
cisco | ios | 12.3\(8\)yd | |
cisco | ios | 12.3\(8\)yf | |
cisco | ios | 12.3\(8\)yg | |
cisco | ios | 12.3\(8\)yg1 | |
cisco | ios | 12.3\(8\)yg2 | |
cisco | ios | 12.3\(8\)yg3 | |
cisco | ios | 12.3\(8\)yh | |
cisco | ios | 12.3\(8\)yi | |
cisco | ios | 12.3\(8\)yi1 | |
cisco | ios | 12.3\(8\)yi3 | |
cisco | ios | 12.3\(9\) | |
cisco | ios | 12.3\(9a\)bc | |
cisco | ios | 12.3\(9a\)bc2 | |
cisco | ios | 12.3\(9a\)bc6 | |
cisco | ios | 12.3\(9a\)bc7 | |
cisco | ios | 12.3\(9d\) | |
cisco | ios | 12.3\(9e\) | |
cisco | ios | 12.3\(10\) | |
cisco | ios | 12.3\(10c\) | |
cisco | ios | 12.3\(10d\) | |
cisco | ios | 12.3\(10e\) | |
cisco | ios | 12.3\(11\) | |
cisco | ios | 12.3\(11\)t | |
cisco | ios | 12.3\(11\)t4 | |
cisco | ios | 12.3\(11\)t5 | |
cisco | ios | 12.3\(11\)t6 | |
cisco | ios | 12.3\(11\)t8 | |
cisco | ios | 12.3\(11\)t9 | |
cisco | ios | 12.3\(11\)xl | |
cisco | ios | 12.3\(11\)xl3 | |
cisco | ios | 12.3\(11\)yf | |
cisco | ios | 12.3\(11\)yf2 | |
cisco | ios | 12.3\(11\)yf3 | |
cisco | ios | 12.3\(11\)yf4 | |
cisco | ios | 12.3\(11\)yj | |
cisco | ios | 12.3\(11\)yk | |
cisco | ios | 12.3\(11\)yk1 | |
cisco | ios | 12.3\(11\)yk2 | |
cisco | ios | 12.3\(11\)yl | |
cisco | ios | 12.3\(11\)yn | |
cisco | ios | 12.3\(11\)yr | |
cisco | ios | 12.3\(11\)ys | |
cisco | ios | 12.3\(11\)ys1 | |
cisco | ios | 12.3\(11\)yw | |
cisco | ios | 12.3\(12\) | |
cisco | ios | 12.3\(12b\) | |
cisco | ios | 12.3\(12e\) | |
cisco | ios | 12.3\(13\) | |
cisco | ios | 12.3\(13a\) | |
cisco | ios | 12.3\(13a\)bc | |
cisco | ios | 12.3\(13a\)bc1 | |
cisco | ios | 12.3\(13b\) | |
cisco | ios | 12.3\(14\)t | |
cisco | ios | 12.3\(14\)t2 | |
cisco | ios | 12.3\(14\)t4 | |
cisco | ios | 12.3\(14\)t5 | |
cisco | ios | 12.3\(14\)ym4 | |
cisco | ios | 12.3\(14\)yq | |
cisco | ios | 12.3\(14\)yq1 | |
cisco | ios | 12.3\(14\)yq3 | |
cisco | ios | 12.3\(14\)yq4 | |
cisco | ios | 12.3\(14\)yt | |
cisco | ios | 12.3\(14\)yt1 | |
cisco | ios | 12.3\(14\)yu | |
cisco | ios | 12.3\(14\)yu1 | |
cisco | ios | 12.3\(15\) | |
cisco | ios | 12.3\(15b\) | |
cisco | ios | 12.3\(16\) | |
cisco | ios | 12.3b | |
cisco | ios | 12.3bc | |
cisco | ios | 12.3bw | |
cisco | ios | 12.3j | |
cisco | ios | 12.3ja | |
cisco | ios | 12.3jea | |
cisco | ios | 12.3jeb | |
cisco | ios | 12.3jec | |
cisco | ios | 12.3jk | |
cisco | ios | 12.3jx | |
cisco | ios | 12.3t | |
cisco | ios | 12.3tpc | |
cisco | ios | 12.3xa | |
cisco | ios | 12.3xb | |
cisco | ios | 12.3xc | |
cisco | ios | 12.3xd | |
cisco | ios | 12.3xe | |
cisco | ios | 12.3xf | |
cisco | ios | 12.3xg | |
cisco | ios | 12.3xh | |
cisco | ios | 12.3xi | |
cisco | ios | 12.3xj | |
cisco | ios | 12.3xk | |
cisco | ios | 12.3xl | |
cisco | ios | 12.3xm | |
cisco | ios | 12.3xn | |
cisco | ios | 12.3xq | |
cisco | ios | 12.3xr | |
cisco | ios | 12.3xs | |
cisco | ios | 12.3xt | |
cisco | ios | 12.3xu | |
cisco | ios | 12.3xv | |
cisco | ios | 12.3xw | |
cisco | ios | 12.3xx | |
cisco | ios | 12.3xy | |
cisco | ios | 12.3xz | |
cisco | ios | 12.3ya | |
cisco | ios | 12.3yb | |
cisco | ios | 12.3yc | |
cisco | ios | 12.3yd | |
cisco | ios | 12.3ye | |
cisco | ios | 12.3yf | |
cisco | ios | 12.3yg | |
cisco | ios | 12.3yh | |
cisco | ios | 12.3yi | |
cisco | ios | 12.3yj | |
cisco | ios | 12.3yk | |
cisco | ios | 12.3yl | |
cisco | ios | 12.3ym | |
cisco | ios | 12.3yn | |
cisco | ios | 12.3yq | |
cisco | ios | 12.3yr | |
cisco | ios | 12.3ys | |
cisco | ios | 12.3yt | |
cisco | ios | 12.3yu | |
cisco | ios | 12.3yw | |
cisco | ios | 12.3yx | |
cisco | ios | 12.3yz | |
cisco | ios | 12.4 | |
cisco | ios | 12.4\(1\) | |
cisco | ios | 12.4\(1b\) | |
cisco | ios | 12.4\(1c\) | |
cisco | ios | 12.4\(2\)mr | |
cisco | ios | 12.4\(2\)mr1 | |
cisco | ios | 12.4\(2\)t | |
cisco | ios | 12.4\(2\)t1 | |
cisco | ios | 12.4\(2\)t2 | |
cisco | ios | 12.4\(2\)t3 | |
cisco | ios | 12.4\(2\)t4 | |
cisco | ios | 12.4\(2\)xa | |
cisco | ios | 12.4\(2\)xb | |
cisco | ios | 12.4\(2\)xb2 | |
cisco | ios | 12.4\(3\) | |
cisco | ios | 12.4\(3\)t2 | |
cisco | ios | 12.4\(3a\) | |
cisco | ios | 12.4\(3b\) | |
cisco | ios | 12.4\(3d\) | |
cisco | ios | 12.4\(4\)mr | |
cisco | ios | 12.4\(4\)t | |
cisco | ios | 12.4\(4\)t2 | |
cisco | ios | 12.4\(5\) | |
cisco | ios | 12.4\(5b\) | |
cisco | ios | 12.4\(6\)t | |
cisco | ios | 12.4\(6\)t1 | |
cisco | ios | 12.4\(7\) | |
cisco | ios | 12.4\(7a\) | |
cisco | ios | 12.4\(8\) | |
cisco | ios | 12.4\(9\)t | |
cisco | ios | 12.4ja | |
cisco | ios | 12.4md | |
cisco | ios | 12.4mr | |
cisco | ios | 12.4sw | |
cisco | ios | 12.4t | |
cisco | ios | 12.4xa | |
cisco | ios | 12.4xb | |
cisco | ios | 12.4xc | |
cisco | ios | 12.4xd | |
cisco | ios | 12.4xe | |
cisco | ios | 12.4xf | |
cisco | ios | 12.4xg | |
cisco | ios | 12.4xj | |
cisco | ios | 12.4xk | |
cisco | ios | 12.4xl | |
cisco | ios | 12.4xm | |
cisco | ios | 12.4xn | |
cisco | ios | 12.4xp | |
cisco | ios | 12.4xt | |
cisco | ios | 12.4xv | |
cisco | ios | 12.4xw | |
dragonflybsd | dragonflybsd | - | |
dragonflybsd | dragonflybsd | 1.0 | |
dragonflybsd | dragonflybsd | 1.1 | |
dragonflybsd | dragonflybsd | 1.2 | |
dragonflybsd | dragonflybsd | 1.10.1 | |
freebsd | freebsd | - | |
freebsd | freebsd | 0.4_1 | |
freebsd | freebsd | 1.0 | |
freebsd | freebsd | 1.1 | |
freebsd | freebsd | 1.1.5 | |
freebsd | freebsd | 1.1.5.1 | |
freebsd | freebsd | 1.2 | |
freebsd | freebsd | 1.5 | |
freebsd | freebsd | 2.0 | |
freebsd | freebsd | 2.0.1 | |
freebsd | freebsd | 2.0.5 | |
freebsd | freebsd | 2.1 | |
freebsd | freebsd | 2.1.0 | |
freebsd | freebsd | 2.1.5 | |
freebsd | freebsd | 2.1.6 | |
freebsd | freebsd | 2.1.6.1 | |
freebsd | freebsd | 2.1.7 | |
freebsd | freebsd | 2.1.7.1 | |
freebsd | freebsd | 2.2 | |
freebsd | freebsd | 2.2.1 | |
freebsd | freebsd | 2.2.2 | |
freebsd | freebsd | 2.2.3 | |
freebsd | freebsd | 2.2.4 | |
freebsd | freebsd | 2.2.5 | |
freebsd | freebsd | 2.2.6 | |
freebsd | freebsd | 2.2.7 | |
freebsd | freebsd | 2.2.8 | |
freebsd | freebsd | 3.0 | |
freebsd | freebsd | 3.1 | |
freebsd | freebsd | 3.2 | |
freebsd | freebsd | 3.3 | |
freebsd | freebsd | 3.4 | |
freebsd | freebsd | 3.5 | |
freebsd | freebsd | 3.5.1 | |
freebsd | freebsd | 4.0 | |
freebsd | freebsd | 4.1 | |
freebsd | freebsd | 4.1.1 | |
freebsd | freebsd | 4.2 | |
freebsd | freebsd | 4.3 | |
freebsd | freebsd | 4.4 | |
freebsd | freebsd | 4.5 | |
freebsd | freebsd | 4.6 | |
freebsd | freebsd | 4.6.1 | |
freebsd | freebsd | 4.6.1 | |
freebsd | freebsd | 4.6.1 | |
freebsd | freebsd | 4.6.1 | |
freebsd | freebsd | 4.6.1 | |
freebsd | freebsd | 4.6.2 | |
freebsd | freebsd | 4.7 | |
freebsd | freebsd | 4.8 | |
freebsd | freebsd | 4.8 | |
freebsd | freebsd | 4.8 | |
freebsd | freebsd | 4.8 | |
freebsd | freebsd | 4.9 | |
freebsd | freebsd | 4.10 | |
freebsd | freebsd | 4.11 | |
freebsd | freebsd | 5.0 | |
freebsd | freebsd | 5.1 | |
freebsd | freebsd | 5.2 | |
freebsd | freebsd | 5.2.1 | |
freebsd | freebsd | 5.3 | |
freebsd | freebsd | 5.4 | |
freebsd | freebsd | 5.5 | |
freebsd | freebsd | 6.0 | |
freebsd | freebsd | 6.1 | |
freebsd | freebsd | 6.2 | |
freebsd | freebsd | 6.3 | |
freebsd | freebsd | 7.0 | |
freebsd | freebsd | 7.1 | |
linux | linux_kernel | - | |
linux | linux_kernel | 1.2.0 | |
linux | linux_kernel | 1.3.0 | |
linux | linux_kernel | 2.0 | |
linux | linux_kernel | 2.0.1 | |
linux | linux_kernel | 2.0.2 | |
linux | linux_kernel | 2.0.3 | |
linux | linux_kernel | 2.0.4 | |
linux | linux_kernel | 2.0.5 | |
linux | linux_kernel | 2.0.6 | |
linux | linux_kernel | 2.0.7 | |
linux | linux_kernel | 2.0.8 | |
linux | linux_kernel | 2.0.9 | |
linux | linux_kernel | 2.0.9.9 | |
linux | linux_kernel | 2.0.10 | |
linux | linux_kernel | 2.0.11 | |
linux | linux_kernel | 2.0.12 | |
linux | linux_kernel | 2.0.13 | |
linux | linux_kernel | 2.0.14 | |
linux | linux_kernel | 2.0.15 | |
linux | linux_kernel | 2.0.16 | |
linux | linux_kernel | 2.0.17 | |
linux | linux_kernel | 2.0.18 | |
linux | linux_kernel | 2.0.19 | |
linux | linux_kernel | 2.0.20 | |
linux | linux_kernel | 2.0.21 | |
linux | linux_kernel | 2.0.22 | |
linux | linux_kernel | 2.0.23 | |
linux | linux_kernel | 2.0.24 | |
linux | linux_kernel | 2.0.25 | |
linux | linux_kernel | 2.0.26 | |
linux | linux_kernel | 2.0.27 | |
linux | linux_kernel | 2.0.28 | |
linux | linux_kernel | 2.0.29 | |
linux | linux_kernel | 2.0.30 | |
linux | linux_kernel | 2.0.31 | |
linux | linux_kernel | 2.0.32 | |
linux | linux_kernel | 2.0.33 | |
linux | linux_kernel | 2.0.34 | |
linux | linux_kernel | 2.0.35 | |
linux | linux_kernel | 2.0.36 | |
linux | linux_kernel | 2.0.37 | |
linux | linux_kernel | 2.0.38 | |
linux | linux_kernel | 2.0.39 | |
linux | linux_kernel | 2.1 | |
linux | linux_kernel | 2.1.89 | |
linux | linux_kernel | 2.1.132 | |
linux | linux_kernel | 2.2.0 | |
linux | linux_kernel | 2.2.1 | |
linux | linux_kernel | 2.2.2 | |
linux | linux_kernel | 2.2.3 | |
linux | linux_kernel | 2.2.4 | |
linux | linux_kernel | 2.2.5 | |
linux | linux_kernel | 2.2.6 | |
linux | linux_kernel | 2.2.7 | |
linux | linux_kernel | 2.2.8 | |
linux | linux_kernel | 2.2.9 | |
linux | linux_kernel | 2.2.10 | |
linux | linux_kernel | 2.2.11 | |
linux | linux_kernel | 2.2.12 | |
linux | linux_kernel | 2.2.13 | |
linux | linux_kernel | 2.2.14 | |
linux | linux_kernel | 2.2.15 | |
linux | linux_kernel | 2.2.16 | |
linux | linux_kernel | 2.2.17 | |
linux | linux_kernel | 2.2.18 | |
linux | linux_kernel | 2.2.19 | |
linux | linux_kernel | 2.2.20 | |
linux | linux_kernel | 2.2.21 | |
linux | linux_kernel | 2.2.22 | |
linux | linux_kernel | 2.2.23 | |
linux | linux_kernel | 2.2.24 | |
linux | linux_kernel | 2.2.25 | |
linux | linux_kernel | 2.2.26 | |
linux | linux_kernel | 2.2.27 | |
linux | linux_kernel | 2.3.0 | |
linux | linux_kernel | 2.3.1 | |
linux | linux_kernel | 2.3.2 | |
linux | linux_kernel | 2.3.3 | |
linux | linux_kernel | 2.3.4 | |
linux | linux_kernel | 2.3.5 | |
linux | linux_kernel | 2.3.6 | |
linux | linux_kernel | 2.3.7 | |
linux | linux_kernel | 2.3.8 | |
linux | linux_kernel | 2.3.9 | |
linux | linux_kernel | 2.3.10 | |
linux | linux_kernel | 2.3.11 | |
linux | linux_kernel | 2.3.12 | |
linux | linux_kernel | 2.3.13 | |
linux | linux_kernel | 2.3.14 | |
linux | linux_kernel | 2.3.15 | |
linux | linux_kernel | 2.3.16 | |
linux | linux_kernel | 2.3.17 | |
linux | linux_kernel | 2.3.18 | |
linux | linux_kernel | 2.3.19 | |
linux | linux_kernel | 2.3.20 | |
linux | linux_kernel | 2.3.21 | |
linux | linux_kernel | 2.3.22 | |
linux | linux_kernel | 2.3.23 | |
linux | linux_kernel | 2.3.24 | |
linux | linux_kernel | 2.3.25 | |
linux | linux_kernel | 2.3.26 | |
linux | linux_kernel | 2.3.27 | |
linux | linux_kernel | 2.3.28 | |
linux | linux_kernel | 2.3.29 | |
linux | linux_kernel | 2.3.30 | |
linux | linux_kernel | 2.3.31 | |
linux | linux_kernel | 2.3.32 | |
linux | linux_kernel | 2.3.33 | |
linux | linux_kernel | 2.3.34 | |
linux | linux_kernel | 2.3.35 | |
linux | linux_kernel | 2.3.36 | |
linux | linux_kernel | 2.3.37 | |
linux | linux_kernel | 2.3.38 | |
linux | linux_kernel | 2.3.39 | |
linux | linux_kernel | 2.3.40 | |
linux | linux_kernel | 2.3.41 | |
linux | linux_kernel | 2.3.42 | |
linux | linux_kernel | 2.3.43 | |
linux | linux_kernel | 2.3.44 | |
linux | linux_kernel | 2.3.45 | |
linux | linux_kernel | 2.3.46 | |
linux | linux_kernel | 2.3.47 | |
linux | linux_kernel | 2.3.48 | |
linux | linux_kernel | 2.3.49 | |
linux | linux_kernel | 2.3.50 | |
linux | linux_kernel | 2.3.51 | |
linux | linux_kernel | 2.3.99 | |
linux | linux_kernel | 2.4.0 | |
linux | linux_kernel | 2.4.1 | |
linux | linux_kernel | 2.4.2 | |
linux | linux_kernel | 2.4.3 | |
linux | linux_kernel | 2.4.4 | |
linux | linux_kernel | 2.4.5 | |
linux | linux_kernel | 2.4.6 | |
linux | linux_kernel | 2.4.7 | |
linux | linux_kernel | 2.4.8 | |
linux | linux_kernel | 2.4.9 | |
linux | linux_kernel | 2.4.10 | |
linux | linux_kernel | 2.4.11 | |
linux | linux_kernel | 2.4.12 | |
linux | linux_kernel | 2.4.13 | |
linux | linux_kernel | 2.4.14 | |
linux | linux_kernel | 2.4.15 | |
linux | linux_kernel | 2.4.16 | |
linux | linux_kernel | 2.4.17 | |
linux | linux_kernel | 2.4.18 | |
linux | linux_kernel | 2.4.19 | |
linux | linux_kernel | 2.4.20 | |
linux | linux_kernel | 2.4.21 | |
linux | linux_kernel | 2.4.22 | |
linux | linux_kernel | 2.4.23 | |
linux | linux_kernel | 2.4.24 | |
linux | linux_kernel | 2.4.25 | |
linux | linux_kernel | 2.4.26 | |
linux | linux_kernel | 2.4.27 | |
linux | linux_kernel | 2.4.28 | |
linux | linux_kernel | 2.4.29 | |
linux | linux_kernel | 2.4.30 | |
linux | linux_kernel | 2.4.31 | |
linux | linux_kernel | 2.4.32 | |
linux | linux_kernel | 2.4.33 | |
linux | linux_kernel | 2.4.33.2 | |
linux | linux_kernel | 2.4.33.3 | |
linux | linux_kernel | 2.4.33.4 | |
linux | linux_kernel | 2.4.33.5 | |
linux | linux_kernel | 2.4.34 | |
linux | linux_kernel | 2.4.34.1 | |
linux | linux_kernel | 2.4.34.2 | |
linux | linux_kernel | 2.4.35 | |
linux | linux_kernel | 2.4.35.2 | |
linux | linux_kernel | 2.5.0 | |
linux | linux_kernel | 2.5.1 | |
linux | linux_kernel | 2.5.2 | |
linux | linux_kernel | 2.5.3 | |
linux | linux_kernel | 2.5.4 | |
linux | linux_kernel | 2.5.5 | |
linux | linux_kernel | 2.5.6 | |
linux | linux_kernel | 2.5.7 | |
linux | linux_kernel | 2.5.8 | |
linux | linux_kernel | 2.5.9 | |
linux | linux_kernel | 2.5.10 | |
linux | linux_kernel | 2.5.11 | |
linux | linux_kernel | 2.5.12 | |
linux | linux_kernel | 2.5.13 | |
linux | linux_kernel | 2.5.14 | |
linux | linux_kernel | 2.5.15 | |
linux | linux_kernel | 2.5.16 | |
linux | linux_kernel | 2.5.17 | |
linux | linux_kernel | 2.5.18 | |
linux | linux_kernel | 2.5.19 | |
linux | linux_kernel | 2.5.20 | |
linux | linux_kernel | 2.5.21 | |
linux | linux_kernel | 2.5.22 | |
linux | linux_kernel | 2.5.23 | |
linux | linux_kernel | 2.5.24 | |
linux | linux_kernel | 2.5.25 | |
linux | linux_kernel | 2.5.26 | |
linux | linux_kernel | 2.5.27 | |
linux | linux_kernel | 2.5.28 | |
linux | linux_kernel | 2.5.29 | |
linux | linux_kernel | 2.5.30 | |
linux | linux_kernel | 2.5.31 | |
linux | linux_kernel | 2.5.32 | |
linux | linux_kernel | 2.5.33 | |
linux | linux_kernel | 2.5.34 | |
linux | linux_kernel | 2.5.35 | |
linux | linux_kernel | 2.5.36 | |
linux | linux_kernel | 2.5.37 | |
linux | linux_kernel | 2.5.38 | |
linux | linux_kernel | 2.5.39 | |
linux | linux_kernel | 2.5.40 | |
linux | linux_kernel | 2.5.41 | |
linux | linux_kernel | 2.5.42 | |
linux | linux_kernel | 2.5.43 | |
linux | linux_kernel | 2.5.44 | |
linux | linux_kernel | 2.5.45 | |
linux | linux_kernel | 2.5.46 | |
linux | linux_kernel | 2.5.47 | |
linux | linux_kernel | 2.5.48 | |
linux | linux_kernel | 2.5.49 | |
linux | linux_kernel | 2.5.50 | |
linux | linux_kernel | 2.5.51 | |
linux | linux_kernel | 2.5.52 | |
linux | linux_kernel | 2.5.53 | |
linux | linux_kernel | 2.5.54 | |
linux | linux_kernel | 2.5.55 | |
linux | linux_kernel | 2.5.56 | |
linux | linux_kernel | 2.5.57 | |
linux | linux_kernel | 2.5.58 | |
linux | linux_kernel | 2.5.59 | |
linux | linux_kernel | 2.5.60 | |
linux | linux_kernel | 2.5.61 | |
linux | linux_kernel | 2.5.62 | |
linux | linux_kernel | 2.5.63 | |
linux | linux_kernel | 2.5.64 | |
linux | linux_kernel | 2.5.65 | |
linux | linux_kernel | 2.5.66 | |
linux | linux_kernel | 2.5.67 | |
linux | linux_kernel | 2.5.68 | |
linux | linux_kernel | 2.5.69 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.2 | |
linux | linux_kernel | 2.6.3 | |
linux | linux_kernel | 2.6.4 | |
linux | linux_kernel | 2.6.5 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8.1 | |
linux | linux_kernel | 2.6.8.1.5 | |
linux | linux_kernel | 2.6.9 | |
linux | linux_kernel | 2.6.10 | |
linux | linux_kernel | 2.6.11 | |
linux | linux_kernel | 2.6.11.1 | |
linux | linux_kernel | 2.6.11.2 | |
linux | linux_kernel | 2.6.11.3 | |
linux | linux_kernel | 2.6.11.4 | |
linux | linux_kernel | 2.6.11.5 | |
linux | linux_kernel | 2.6.11.6 | |
linux | linux_kernel | 2.6.11.7 | |
linux | linux_kernel | 2.6.11.8 | |
linux | linux_kernel | 2.6.11.9 | |
linux | linux_kernel | 2.6.11.10 | |
linux | linux_kernel | 2.6.11.11 | |
linux | linux_kernel | 2.6.11.12 | |
linux | linux_kernel | 2.6.12 | |
linux | linux_kernel | 2.6.12.1 | |
linux | linux_kernel | 2.6.12.2 | |
linux | linux_kernel | 2.6.12.3 | |
linux | linux_kernel | 2.6.12.4 | |
linux | linux_kernel | 2.6.12.5 | |
linux | linux_kernel | 2.6.12.6 | |
linux | linux_kernel | 2.6.12.12 | |
linux | linux_kernel | 2.6.12.22 | |
linux | linux_kernel | 2.6.13 | |
linux | linux_kernel | 2.6.13.1 | |
linux | linux_kernel | 2.6.13.2 | |
linux | linux_kernel | 2.6.13.3 | |
linux | linux_kernel | 2.6.13.4 | |
linux | linux_kernel | 2.6.13.5 | |
linux | linux_kernel | 2.6.14 | |
linux | linux_kernel | 2.6.14.1 | |
linux | linux_kernel | 2.6.14.2 | |
linux | linux_kernel | 2.6.14.3 | |
linux | linux_kernel | 2.6.14.4 | |
linux | linux_kernel | 2.6.14.5 | |
linux | linux_kernel | 2.6.14.6 | |
linux | linux_kernel | 2.6.14.7 | |
linux | linux_kernel | 2.6.15 | |
linux | linux_kernel | 2.6.15.1 | |
linux | linux_kernel | 2.6.15.2 | |
linux | linux_kernel | 2.6.15.3 | |
linux | linux_kernel | 2.6.15.4 | |
linux | linux_kernel | 2.6.15.5 | |
linux | linux_kernel | 2.6.15.6 | |
linux | linux_kernel | 2.6.15.7 | |
linux | linux_kernel | 2.6.15.11 | |
linux | linux_kernel | 2.6.16 | |
linux | linux_kernel | 2.6.16.1 | |
linux | linux_kernel | 2.6.16.2 | |
linux | linux_kernel | 2.6.16.3 | |
linux | linux_kernel | 2.6.16.4 | |
linux | linux_kernel | 2.6.16.5 | |
linux | linux_kernel | 2.6.16.6 | |
linux | linux_kernel | 2.6.16.7 | |
linux | linux_kernel | 2.6.16.8 | |
linux | linux_kernel | 2.6.16.9 | |
linux | linux_kernel | 2.6.16.10 | |
linux | linux_kernel | 2.6.16.11 | |
linux | linux_kernel | 2.6.16.12 | |
linux | linux_kernel | 2.6.16.13 | |
linux | linux_kernel | 2.6.16.14 | |
linux | linux_kernel | 2.6.16.15 | |
linux | linux_kernel | 2.6.16.16 | |
linux | linux_kernel | 2.6.16.17 | |
linux | linux_kernel | 2.6.16.18 | |
linux | linux_kernel | 2.6.16.19 | |
linux | linux_kernel | 2.6.16.20 | |
linux | linux_kernel | 2.6.16.21 | |
linux | linux_kernel | 2.6.16.22 | |
linux | linux_kernel | 2.6.16.23 | |
linux | linux_kernel | 2.6.16.24 | |
linux | linux_kernel | 2.6.16.25 | |
linux | linux_kernel | 2.6.16.26 | |
linux | linux_kernel | 2.6.16.27 | |
linux | linux_kernel | 2.6.16.28 | |
linux | linux_kernel | 2.6.16.29 | |
linux | linux_kernel | 2.6.16.30 | |
linux | linux_kernel | 2.6.16.31 | |
linux | linux_kernel | 2.6.16.32 | |
linux | linux_kernel | 2.6.16.33 | |
linux | linux_kernel | 2.6.16.34 | |
linux | linux_kernel | 2.6.16.35 | |
linux | linux_kernel | 2.6.16.36 | |
linux | linux_kernel | 2.6.16.37 | |
linux | linux_kernel | 2.6.16.38 | |
linux | linux_kernel | 2.6.16.39 | |
linux | linux_kernel | 2.6.16.40 | |
linux | linux_kernel | 2.6.16.41 | |
linux | linux_kernel | 2.6.16.43 | |
linux | linux_kernel | 2.6.16.44 | |
linux | linux_kernel | 2.6.16.45 | |
linux | linux_kernel | 2.6.16.46 | |
linux | linux_kernel | 2.6.16.47 | |
linux | linux_kernel | 2.6.16.48 | |
linux | linux_kernel | 2.6.16.49 | |
linux | linux_kernel | 2.6.16.50 | |
linux | linux_kernel | 2.6.16.51 | |
linux | linux_kernel | 2.6.16.52 | |
linux | linux_kernel | 2.6.16.53 | |
linux | linux_kernel | 2.6.17 | |
linux | linux_kernel | 2.6.17.1 | |
linux | linux_kernel | 2.6.17.2 | |
linux | linux_kernel | 2.6.17.3 | |
linux | linux_kernel | 2.6.17.4 | |
linux | linux_kernel | 2.6.17.5 | |
linux | linux_kernel | 2.6.17.6 | |
linux | linux_kernel | 2.6.17.7 | |
linux | linux_kernel | 2.6.17.8 | |
linux | linux_kernel | 2.6.17.9 | |
linux | linux_kernel | 2.6.17.10 | |
linux | linux_kernel | 2.6.17.11 | |
linux | linux_kernel | 2.6.17.12 | |
linux | linux_kernel | 2.6.17.13 | |
linux | linux_kernel | 2.6.17.14 | |
linux | linux_kernel | 2.6.18 | |
linux | linux_kernel | 2.6.18.0 | |
linux | linux_kernel | 2.6.18.1 | |
linux | linux_kernel | 2.6.18.2 | |
linux | linux_kernel | 2.6.18.3 | |
linux | linux_kernel | 2.6.18.4 | |
linux | linux_kernel | 2.6.18.5 | |
linux | linux_kernel | 2.6.18.6 | |
linux | linux_kernel | 2.6.18.7 | |
linux | linux_kernel | 2.6.18.8 | |
linux | linux_kernel | 2.6.19 | |
linux | linux_kernel | 2.6.19.1 | |
linux | linux_kernel | 2.6.19.2 | |
linux | linux_kernel | 2.6.19.3 | |
linux | linux_kernel | 2.6.19.4 | |
linux | linux_kernel | 2.6.20 | |
linux | linux_kernel | 2.6.20.1 | |
linux | linux_kernel | 2.6.20.2 | |
linux | linux_kernel | 2.6.20.3 | |
linux | linux_kernel | 2.6.20.4 | |
linux | linux_kernel | 2.6.20.5 | |
linux | linux_kernel | 2.6.20.6 | |
linux | linux_kernel | 2.6.20.7 | |
linux | linux_kernel | 2.6.20.8 | |
linux | linux_kernel | 2.6.20.9 | |
linux | linux_kernel | 2.6.20.10 | |
linux | linux_kernel | 2.6.20.11 | |
linux | linux_kernel | 2.6.20.12 | |
linux | linux_kernel | 2.6.20.13 | |
linux | linux_kernel | 2.6.20.14 | |
linux | linux_kernel | 2.6.20.15 | |
linux | linux_kernel | 2.6.21 | |
linux | linux_kernel | 2.6.21.1 | |
linux | linux_kernel | 2.6.21.2 | |
linux | linux_kernel | 2.6.21.3 | |
linux | linux_kernel | 2.6.21.4 | |
linux | linux_kernel | 2.6.22 | |
linux | linux_kernel | 2.6.22.1 | |
linux | linux_kernel | 2.6.22.3 | |
linux | linux_kernel | 2.6.22.4 | |
linux | linux_kernel | 2.6.22.5 | |
linux | linux_kernel | 2.6.22.6 | |
linux | linux_kernel | 2.6.22.7 | |
linux | linux_kernel | 2.6.22.16 | |
linux | linux_kernel | 2.6.23 | |
linux | linux_kernel | 2.6.23.1 | |
linux | linux_kernel | 2.6.23.2 | |
linux | linux_kernel | 2.6.23.3 | |
linux | linux_kernel | 2.6.23.4 | |
linux | linux_kernel | 2.6.23.5 | |
linux | linux_kernel | 2.6.23.6 | |
linux | linux_kernel | 2.6.23.7 | |
linux | linux_kernel | 2.6.23.9 | |
linux | linux_kernel | 2.6.23.14 | |
linux | linux_kernel | 2.6.24 | |
linux | linux_kernel | 2.6.24 | |
midnightbsd | midnightbsd | - | |
netbsd | netbsd | - | |
netbsd | netbsd | 1.0 | |
netbsd | netbsd | 1.1 | |
netbsd | netbsd | 1.2 | |
netbsd | netbsd | 1.2.1 | |
netbsd | netbsd | 1.3 | |
netbsd | netbsd | 1.3.1 | |
netbsd | netbsd | 1.3.2 | |
netbsd | netbsd | 1.3.3 | |
netbsd | netbsd | 1.4 | |
netbsd | netbsd | 1.4.1 | |
netbsd | netbsd | 1.4.2 | |
netbsd | netbsd | 1.4.3 | |
netbsd | netbsd | 1.5 | |
netbsd | netbsd | 1.5.1 | |
netbsd | netbsd | 1.5.2 | |
netbsd | netbsd | 1.5.3 | |
netbsd | netbsd | 1.6 | |
netbsd | netbsd | 1.6.1 | |
netbsd | netbsd | 1.6.2 | |
netbsd | netbsd | 2.0 | |
netbsd | netbsd | 2.0.1 | |
netbsd | netbsd | 2.0.2 | |
netbsd | netbsd | 2.0.3 | |
netbsd | netbsd | 2.0.4 | |
netbsd | netbsd | 2.1 | |
netbsd | netbsd | 2.1.1 | |
netbsd | netbsd | 3.0 | |
netbsd | netbsd | 3.0.1 | |
netbsd | netbsd | 3.0.2 | |
netbsd | netbsd | 3.1 | |
netbsd | netbsd | 3.99.15 | |
netbsd | netbsd | 4.0 | |
openbsd | openbsd | - | |
openbsd | openbsd | 2.0 | |
openbsd | openbsd | 2.1 | |
openbsd | openbsd | 2.2 | |
openbsd | openbsd | 2.3 | |
openbsd | openbsd | 2.4 | |
openbsd | openbsd | 2.5 | |
openbsd | openbsd | 2.6 | |
openbsd | openbsd | 2.7 | |
openbsd | openbsd | 2.8 | |
openbsd | openbsd | 2.9 | |
openbsd | openbsd | 3.0 | |
openbsd | openbsd | 3.1 | |
openbsd | openbsd | 3.2 | |
openbsd | openbsd | 3.3 | |
openbsd | openbsd | 3.4 | |
openbsd | openbsd | 3.5 | |
openbsd | openbsd | 3.6 | |
openbsd | openbsd | 3.7 | |
openbsd | openbsd | 3.8 | |
openbsd | openbsd | 3.9 | |
openbsd | openbsd | 4.0 | |
openbsd | openbsd | 4.1 | |
openbsd | openbsd | 4.2 | |
openbsd | openbsd | 4.3 | |
trustedbsd | trustedbsd | - | |
microsoft | windows_2000 | - | |
microsoft | windows_server_2003 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_server_2008 | - | |
microsoft | windows_vista | - | |
microsoft | windows_vista | - | |
microsoft | windows_xp | - | |
microsoft | windows_xp | - | |
cisco | catalyst_blade_switch_3020_firmware | * | |
cisco | catalyst_blade_switch_3020 | - | |
cisco | catalyst_blade_switch_3120_firmware | * | |
cisco | catalyst_blade_switch_3120 | - | |
cisco | catalyst_blade_switch_3120x_firmware | * | |
cisco | catalyst_blade_switch_3120x | - | |
oracle | solaris | 8 | |
oracle | solaris | 9 | |
oracle | solaris | 10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:bsd:bsd:-:*:*:*:*:*:*:*", matchCriteriaId: "BAD1A8C6-A3A4-47A6-B8B0-6CB6787C5B3C", vulnerable: true, }, { criteria: "cpe:2.3:o:bsd:bsd:4.1:*:*:*:*:*:*:*", matchCriteriaId: "BD1119D3-A2B4-45C2-8EC1-F28EB948CDC6", vulnerable: true, }, { criteria: "cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*", matchCriteriaId: "32E0E862-63E6-42DA-8CCC-AAAC581FE211", vulnerable: true, }, { criteria: "cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*", matchCriteriaId: "388BB5C2-53B3-4597-913C-7D86E585CCD5", vulnerable: true, }, { criteria: "cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*", matchCriteriaId: "3C37EB61-50BE-451A-916B-B05BAC79962B", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:-:*:*:*:*:*:*:*", matchCriteriaId: "2466F147-1EEC-442F-8066-EF7C65D17F3D", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*", matchCriteriaId: "2F5E922C-239D-4F98-87ED-BB7998BE99C5", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*", matchCriteriaId: "DD254562-D74A-4D7C-B846-E242D785B830", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "BBFBCFEE-C24C-4D38-83F9-810E05D27901", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*", matchCriteriaId: "766851E2-134A-4A89-931B-6F1753525684", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*", matchCriteriaId: "99235B00-0050-42BF-99EF-FCDD72D8627D", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*", matchCriteriaId: "950CE88E-E396-4D32-AC9D-B76EB2B537C6", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:3.2:*:*:*:*:*:*:*", matchCriteriaId: "F185FD65-A2A8-4170-8419-E939450055B8", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7ECF99E9-1C3B-4D8F-A52E-28D0BFEB2E9D", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "A37687D5-1239-474B-994C-C638AB9B105B", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:4.1:*:*:*:*:*:*:*", matchCriteriaId: "E0D6DE57-1B0D-4F40-9E9F-CB72BAC0201F", vulnerable: true, }, { criteria: "cpe:2.3:o:bsdi:bsd_os:4.2:*:*:*:*:*:*:*", matchCriteriaId: "7267B83B-1DC7-4A38-9338-B3BC3B2ECD74", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", matchCriteriaId: "B6230A85-30D2-4934-A8A0-11499B7B09F8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*", matchCriteriaId: "96C6FB91-22FC-4DA9-B19A-8065D8B89F03", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "06CF972E-A755-4FB7-BFD7-9F4CDDEA4F1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "9B4FC3E9-E88E-4C87-ADA4-AC9370BBFD32", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:8.2:*:*:*:*:*:*:*", matchCriteriaId: "E72B3032-154D-45C2-8380-CCB28E4F2E8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:8.3:*:*:*:*:*:*:*", matchCriteriaId: "87395248-5E9C-4257-9CC7-2E2805B69F83", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:9.0:*:*:*:*:*:*:*", matchCriteriaId: "A476BFB0-E587-41A6-B691-2609E0146C2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*", matchCriteriaId: "2E9A00D5-A594-4C64-B982-10CB4C554F51", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*", matchCriteriaId: "327028C0-D9F3-46A3-B2CC-4630FE18C43E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", matchCriteriaId: "79528F96-FD42-4A76-82EE-4B1324D53B5F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.3:*:*:*:*:*:*:*", matchCriteriaId: "3824A6CC-5C3A-4146-9CDD-B7B213527552", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.3\\(3.3\\):*:*:*:*:*:*:*", matchCriteriaId: "F9FE0721-5166-4756-B620-9C2DFCB252A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.3\\(3.4\\):*:*:*:*:*:*:*", matchCriteriaId: "630947E3-6D04-4A99-AAB3-B988BD513885", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.3\\(4.2\\):*:*:*:*:*:*:*", matchCriteriaId: "850D8A04-E853-4570-A81D-EC053C47BB4B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.3\\(4.3\\):*:*:*:*:*:*:*", matchCriteriaId: "67D70854-1DEC-43FF-ABA6-85009A253874", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.3\\(16\\):*:*:*:*:*:*:*", matchCriteriaId: "D48379D9-1189-4176-A48E-A6ED9B3F91BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:10.3\\(19a\\):*:*:*:*:*:*:*", matchCriteriaId: "5A60756F-CF53-4E57-B313-EC6B9E160B39", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11:*:*:*:*:*:*:*", matchCriteriaId: "155F8A0D-EE85-4FB9-97FB-E410A9374310", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", matchCriteriaId: "D626B494-6210-4F74-8D17-BA480B6665C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(12\\):*:*:*:*:*:*:*", matchCriteriaId: "B5F4E6F1-8624-4672-A4F3-EC79E49E6D40", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(17\\):*:*:*:*:*:*:*", matchCriteriaId: "E41CBC97-0C46-4717-A525-3A674F07C122", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(17\\)bt:*:*:*:*:*:*:*", matchCriteriaId: "275BF994-A447-4C58-855C-E0C21D114B2D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(18\\):*:*:*:*:*:*:*", matchCriteriaId: "4742B4D8-971B-450F-916C-C83FAB808BF7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(20.3\\):*:*:*:*:*:*:*", matchCriteriaId: "86AFAF8F-B8E2-453B-895C-F94138720745", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(22a\\):*:*:*:*:*:*:*", matchCriteriaId: "2D8524C5-FBC3-4A2F-96D0-15CC43287DFD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(22b\\):*:*:*:*:*:*:*", matchCriteriaId: "53F3AD1F-6213-42A7-9C93-EA42C3F4288E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0\\(x\\):*:*:*:*:*:*:*", matchCriteriaId: "180E123C-BC2B-4CD0-B772-46253E46B93D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.0.12\\(a\\)bt:*:*:*:*:*:*:*", matchCriteriaId: "321EEFCA-4DDE-4F37-9F55-55B9500CC104", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", matchCriteriaId: "82B6315D-7BEF-419F-9B93-3CF669E986D1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(5\\):*:*:*:*:*:*:*", matchCriteriaId: "19F493EC-885B-4EA6-B1F3-CA5777B67D0B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(7\\):*:*:*:*:*:*:*", matchCriteriaId: "F7AE747C-2507-46FE-B3F8-3C1E6F50353D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(7\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "4B85BFC6-7053-4456-B52A-45F36F285F33", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(7\\)ca:*:*:*:*:*:*:*", matchCriteriaId: "D996F0BC-80EF-45BD-BA24-6F2E22C67D6C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(9\\)ia:*:*:*:*:*:*:*", matchCriteriaId: "D5E95809-C581-4D40-8237-AD74742EBB75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(11\\):*:*:*:*:*:*:*", matchCriteriaId: "AC86CED5-1421-40A9-9573-B87EDA6E462E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(12\\):*:*:*:*:*:*:*", matchCriteriaId: "328D5C81-27AC-41B9-81FE-7666CE9085B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*", matchCriteriaId: "B36FF40E-EF0A-4149-A35D-8D765EBFFAE2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "51382DA5-4EBC-44DC-951F-32FC7AA719A7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*", matchCriteriaId: "5BA2A1FD-11A3-403A-B5A6-0220CA18EC99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*", matchCriteriaId: "3493F361-0C8A-4B66-AF6B-926E2D66BBEE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(14\\):*:*:*:*:*:*:*", matchCriteriaId: "1F7375C1-F60A-4793-8C09-70C950F36F45", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(15\\):*:*:*:*:*:*:*", matchCriteriaId: "DB9CBC6C-9824-486C-B8E2-76DF3EC2A5C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(15\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "FB42AFD1-7FEE-45D4-8CF4-58EF43AB7C93", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*", matchCriteriaId: "841513AE-7521-4670-8438-AE5EB70F3A48", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ia:*:*:*:*:*:*:*", matchCriteriaId: "14BDD1FC-F0DF-443B-A498-CDD3A51F146E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*", matchCriteriaId: "FF3E8F79-6177-453C-99B5-BC9BC7670869", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "4B244655-A6A5-40D0-A0D1-34C814DA9389", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*", matchCriteriaId: "CA064273-1A6E-4303-BAAB-F585691EF9BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(17\\):*:*:*:*:*:*:*", matchCriteriaId: "672742B0-7D4B-4B2E-96C2-0C74D9A5400A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*", matchCriteriaId: "0A8158E2-0DFE-479B-B085-9775FF700C85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*", matchCriteriaId: "29CA3070-B75D-4E56-A338-E10F5509394E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(18\\):*:*:*:*:*:*:*", matchCriteriaId: "AF085D4E-D2EB-46FA-A426-FC53EB7F5FFB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(20\\)aa4:*:*:*:*:*:*:*", matchCriteriaId: "E36721A7-B29F-4C43-B77B-7C8BB9B8DF46", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(22\\):*:*:*:*:*:*:*", matchCriteriaId: "C2AA82A6-B7B8-4B3A-8E6A-968C24EE0FDD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(24\\):*:*:*:*:*:*:*", matchCriteriaId: "81640A61-B4E4-4209-A9AB-726C15522037", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(24a\\):*:*:*:*:*:*:*", matchCriteriaId: "A53348EA-99B2-4091-9112-B3428E019597", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(24b\\):*:*:*:*:*:*:*", matchCriteriaId: "6022E5C8-34BD-45C4-8FD0-7898902B01A6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(24c\\):*:*:*:*:*:*:*", matchCriteriaId: "E9408971-2732-4CBF-A94E-8A1778DFEBCF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(28a\\)ct:*:*:*:*:*:*:*", matchCriteriaId: "D1795C25-47DD-48E2-B1DE-FD080C497B40", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(28a\\)ia:*:*:*:*:*:*:*", matchCriteriaId: "6FDC895C-803F-4B04-BBC8-3571C7ECCC8B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(36\\)ca2:*:*:*:*:*:*:*", matchCriteriaId: "B2ED206F-850A-4AEE-87DA-CC2688BC1173", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(36\\)ca4:*:*:*:*:*:*:*", matchCriteriaId: "F9B084A3-9F94-4F4C-8622-2D56BB2B3593", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(36\\)cc2:*:*:*:*:*:*:*", matchCriteriaId: "DF849813-7A2B-4EB2-8A93-2693636D4E93", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1\\(36\\)cc4:*:*:*:*:*:*:*", matchCriteriaId: "8C43AE16-7B01-4BE1-857D-CFE8AB504FEE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1aa:*:*:*:*:*:*:*", matchCriteriaId: "C2842913-FEFF-4443-809B-F1793DDD08AC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1ca:*:*:*:*:*:*:*", matchCriteriaId: "478D7C73-4039-4352-ADFF-55623B011C82", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*", matchCriteriaId: "D5F31EAA-F76F-4182-B90D-6997E52EEB25", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1ct:*:*:*:*:*:*:*", matchCriteriaId: "8D419BED-A8C0-4304-A0E9-7805CE3E7FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.1ia:*:*:*:*:*:*:*", matchCriteriaId: "BD4EA445-2947-4754-81BF-2046DFD4DE2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*", matchCriteriaId: "E8026B11-6144-467F-8094-F4F73CD37526", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(4\\):*:*:*:*:*:*:*", matchCriteriaId: "550EBE5B-3136-4D67-B2AF-869DE111A821", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f:*:*:*:*:*:*:*", matchCriteriaId: "9D1D2A78-BCE8-4E8A-B7DE-36A64B81820C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*", matchCriteriaId: "17DE2319-19D9-4C02-80B4-0A6AAD853867", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(4\\)xa:*:*:*:*:*:*:*", matchCriteriaId: "7CB0E1F3-CF25-4FD6-B33F-8C9FD660D8B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(4\\)xaf:*:*:*:*:*:*:*", matchCriteriaId: "A9E42FA2-0827-4FCC-98F2-A5C0F79C7016", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*", matchCriteriaId: "82BFEABB-6E90-4A24-BBE3-2BDB524028A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*", matchCriteriaId: "F169E322-3D72-4F86-BD5F-74589E5DD823", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*", matchCriteriaId: "DBA5D334-6DB8-44B0-92EF-8694BBE79A9D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*", matchCriteriaId: "099CFED1-0E2F-46B2-8136-BFA146EB9A00", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*", matchCriteriaId: "754F06BF-EB7D-4DAD-BF5D-7DF2619A7499", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*", matchCriteriaId: "D97C1243-BBEB-44AC-96E1-AC46F946EA42", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(8.9\\)sa6:*:*:*:*:*:*:*", matchCriteriaId: "22CD9785-D78E-408F-A3A0-3974DFF3DE78", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*", matchCriteriaId: "047F9781-38B8-488C-B999-A3CA6BDB639C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*", matchCriteriaId: "3E3586C0-64AF-4584-8F56-7E0756B4A521", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*", matchCriteriaId: "9B784C9F-79EE-4D08-9D03-985EC7E378FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*", matchCriteriaId: "FFBA8825-442E-4CAD-A9B2-4DD8546F35F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(11\\):*:*:*:*:*:*:*", matchCriteriaId: "5947E00E-68E7-4E8C-99C5-D69CA67CFCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(11b\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "394E271B-557A-496C-813E-E067D0188136", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(14\\)gs2:*:*:*:*:*:*:*", matchCriteriaId: "0023E04A-6244-4221-AE19-616265074BDD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(15\\)g:*:*:*:*:*:*:*", matchCriteriaId: "52C4A8A9-A17E-48A1-99EC-A9F87CE17318", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(15a\\)p:*:*:*:*:*:*:*", matchCriteriaId: "B1928C83-1379-4D6C-A7C0-FC7326E558C4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(15b\\):*:*:*:*:*:*:*", matchCriteriaId: "0485E527-0305-4C64-805B-6AD5E611EE50", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(16\\):*:*:*:*:*:*:*", matchCriteriaId: "68C31722-3157-41D6-AABF-B9B18247CE6E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(16\\)p:*:*:*:*:*:*:*", matchCriteriaId: "F33246EE-340C-4D61-B5D1-780A0785B9D1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*", matchCriteriaId: "F106D24F-7EDD-4A52-9A3A-F25E6EEC1870", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(18\\):*:*:*:*:*:*:*", matchCriteriaId: "ED418AF9-FCC1-4BFC-8526-AA1BBD5F8E8A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(19\\)gs0.2:*:*:*:*:*:*:*", matchCriteriaId: "BDF4A90A-8F19-48C6-A340-0CF7701D4F0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(19a\\)gs6:*:*:*:*:*:*:*", matchCriteriaId: "BD5681AC-1FF2-4CC9-959B-5B56E66AB1C6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(23a\\)bc1:*:*:*:*:*:*:*", matchCriteriaId: "82DE2BBD-70F5-42D6-AC32-A2AE2CF21789", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(26\\)p2:*:*:*:*:*:*:*", matchCriteriaId: "2C7B8494-A9C5-4ACD-B345-9650DE3E1003", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(26\\)p5:*:*:*:*:*:*:*", matchCriteriaId: "8C30199A-2150-45A3-867C-AAAAEFECEED0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(26a\\):*:*:*:*:*:*:*", matchCriteriaId: "6EDF0979-4462-4715-A4A0-77DC3273CF22", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(26b\\):*:*:*:*:*:*:*", matchCriteriaId: "FA28477F-5F6A-4627-B521-248A4533E7C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2\\(26e\\):*:*:*:*:*:*:*", matchCriteriaId: "4EF5B2CA-33BC-4D82-97E9-19378EF7AE4C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2bc:*:*:*:*:*:*:*", matchCriteriaId: "BB5BBB7A-3154-4B90-BFC9-17D788387002", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2f:*:*:*:*:*:*:*", matchCriteriaId: "64999EDC-0E53-4736-BA6E-219ADE6E75B3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2gs:*:*:*:*:*:*:*", matchCriteriaId: "95ACBC17-10FA-449C-B418-F705E9A81363", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*", matchCriteriaId: "0DC1411B-4E7E-4F57-B025-9FE27B09C7AC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2sa:*:*:*:*:*:*:*", matchCriteriaId: "AA95673E-1686-48D7-8FE9-99D8FAB47FCA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2wa3:*:*:*:*:*:*:*", matchCriteriaId: "36548158-EA5E-4638-9309-532B1CCD20A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2wa4:*:*:*:*:*:*:*", matchCriteriaId: "29122FF8-92A4-4072-8B8F-2F9AC79BA4A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.2xa:*:*:*:*:*:*:*", matchCriteriaId: "583E7622-18CB-4C58-B714-F14CB12D1491", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", matchCriteriaId: "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "2A6F8329-15C7-4FED-A61D-5AF4F3A33976", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*", matchCriteriaId: "CD13732A-DAE0-4D5B-9DAC-6D2CF391220D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*", matchCriteriaId: "A53DE80A-5865-4514-BE14-BA5992EE7BDA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(2\\)xa:*:*:*:*:*:*:*", matchCriteriaId: "89347FD1-1C65-4947-8AA6-CCCB0F42AC28", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(7\\)db1:*:*:*:*:*:*:*", matchCriteriaId: "D7CB1B7D-F47E-488D-A4BB-5DABB2406673", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(8\\)db2:*:*:*:*:*:*:*", matchCriteriaId: "C03D666A-4FFD-4486-B8ED-183FC10821E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(8\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "E8811993-BEBB-448C-A23A-EDF1344AC076", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(11\\)b:*:*:*:*:*:*:*", matchCriteriaId: "9C7C99C7-ABF5-4581-B3CB-A8B2DCD7A5CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(11b\\):*:*:*:*:*:*:*", matchCriteriaId: "40EEA20D-C974-418D-90AD-2C7099BA76E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(11b\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "918ED671-E08D-4DA6-9FDB-E0878C759F1E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(11c\\):*:*:*:*:*:*:*", matchCriteriaId: "E0DE733B-BDBC-49B0-B63C-4DC291DF99B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3\\(11d\\):*:*:*:*:*:*:*", matchCriteriaId: "8C353926-CFF7-4B84-84FE-0D1B3CFB2057", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*", matchCriteriaId: "D8783C0A-990A-4B79-8BF9-64E425DA585E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*", matchCriteriaId: "11B3630E-6ED6-4A8F-8FBC-AA68E81490F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*", matchCriteriaId: "046D8679-38F8-4DC9-82A7-2562DE0495F7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*", matchCriteriaId: "92509012-2DA2-4045-9AE4-4D8681F64D2F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*", matchCriteriaId: "1C993003-8B99-4CFF-8546-888E8C5D8FEC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*", matchCriteriaId: "80AEA6F5-907D-493F-AB07-971D13BC1CAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*", matchCriteriaId: "655BB9C1-BA90-452E-A9C8-9B1E15B99650", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3wa4:*:*:*:*:*:*:*", matchCriteriaId: "3D3267A4-3654-4C7A-966F-9F26B132A065", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*", matchCriteriaId: "0A747DB2-A031-470F-8EA5-F37FBE175D18", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", matchCriteriaId: "8F86F790-6247-42F2-9487-3D60A2842F52", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "5CFBBDA3-8A5E-407D-8608-45C1BD56BF58", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)s:*:*:*:*:*:*:*", matchCriteriaId: "D14EBDCA-7CEB-4394-95EF-D4AEE991E2DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)st:*:*:*:*:*:*:*", matchCriteriaId: "F006CA61-42CD-4928-A445-E54B968553C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", matchCriteriaId: "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", matchCriteriaId: "AE210B04-7ECD-419C-9258-0F619A353A8A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", matchCriteriaId: "3B467741-B277-4128-9804-E13ED23FD310", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", matchCriteriaId: "77DDC99D-8B73-452C-94A7-A9A48F2F379B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", matchCriteriaId: "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", matchCriteriaId: "C48466C4-5A1E-4C71-8822-32D387B36B8B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "12551307-4D72-4D24-BA0D-07235EB762AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", matchCriteriaId: "08E23131-D207-4D98-96D5-2B71FF792604", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", matchCriteriaId: "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2a\\):*:*:*:*:*:*:*", matchCriteriaId: "6E32C808-0471-443D-98AC-DF30AFFE633D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*", matchCriteriaId: "593E5730-3777-4DEF-A1D3-73AF0B98448B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*", matchCriteriaId: "FF2207E5-7458-40C5-AEF4-73B271EAB3C4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "E7109585-1433-4940-B7C9-C561DEAF1498", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "E4F96BEB-19C2-48E4-8884-EA61B32D5BA2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3.2\\):*:*:*:*:*:*:*", matchCriteriaId: "851EF536-76E0-40E6-9051-7412A8235B4D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3.3\\)s:*:*:*:*:*:*:*", matchCriteriaId: "4E61151D-1658-49B2-AEAA-11F61AB71118", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3.4\\)t:*:*:*:*:*:*:*", matchCriteriaId: "49869323-98A1-4258-8D7E-B6DE9DA45CAA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3.6\\)w5\\(9.0.5\\):*:*:*:*:*:*:*", matchCriteriaId: "52BDD49A-6D71-4C33-8B09-C0E9F2DD030E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*", matchCriteriaId: "32B93745-F14C-428E-9A90-47ACE43451EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", matchCriteriaId: "1A0D82E1-CCF7-429B-A637-479E839EAE3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", matchCriteriaId: "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", matchCriteriaId: "4F1B2747-4A9C-44FC-BBA8-39E338B30417", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "65176343-0120-4038-844E-FDE48A920270", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe1:*:*:*:*:*:*:*", matchCriteriaId: "EAE67104-9212-4E28-886B-ADFA9503DBBF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm:*:*:*:*:*:*:*", matchCriteriaId: "01F9B9CF-787B-4BE0-988C-669531BFFAA2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm1:*:*:*:*:*:*:*", matchCriteriaId: "43D88280-5701-45EF-99CA-3056AD2216F6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", matchCriteriaId: "D5BB7513-C232-4B4F-BE68-972B05086ABD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)s:*:*:*:*:*:*:*", matchCriteriaId: "6C4F875A-D58F-47BA-A441-2362C1688256", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*", matchCriteriaId: "3BCEE111-BEFA-4285-B892-58DE3964F497", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "EA263B60-E7C0-4374-96DF-6E4EB9C16743", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "2C570B5A-185E-4AA7-A8B8-BE80605020FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc:*:*:*:*:*:*:*", matchCriteriaId: "2E17E7C3-53FE-424F-8F47-7B8C70C9807E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2:*:*:*:*:*:*:*", matchCriteriaId: "47E6CE0D-852B-4169-9849-98CDC91E3118", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2b:*:*:*:*:*:*:*", matchCriteriaId: "DD620020-D5B4-4FE3-AEA5-C43686992F74", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3:*:*:*:*:*:*:*", matchCriteriaId: "5B4705F7-8E36-4C2D-A23C-E6002E459F5A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3b:*:*:*:*:*:*:*", matchCriteriaId: "D2A0DF3A-430D-444F-BD02-D18D10245138", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc5a:*:*:*:*:*:*:*", matchCriteriaId: "DA39DE28-F3D3-4613-97EA-11896913F300", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(05\\)wc8:*:*:*:*:*:*:*", matchCriteriaId: "27476F7B-9DD2-4A7F-8C0A-65EF52F70DBA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9:*:*:*:*:*:*:*", matchCriteriaId: "758CF4D4-46B9-4EE1-9C43-0620D1C31EFD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9a:*:*:*:*:*:*:*", matchCriteriaId: "62559EC5-D019-4C78-B589-80E16784A821", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc11:*:*:*:*:*:*:*", matchCriteriaId: "E52672D5-5DFD-484E-9463-522AA4348456", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc13:*:*:*:*:*:*:*", matchCriteriaId: "DE397409-D527-4283-833C-8A79F3CF8749", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wx:*:*:*:*:*:*:*", matchCriteriaId: "F92CF99B-5043-4EDA-965F-3D8F32F9D742", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "15295BD6-CC76-41BE-B5A0-A08888207011", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk:*:*:*:*:*:*:*", matchCriteriaId: "1423776F-1C73-4872-81F6-29C411B6E545", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk2:*:*:*:*:*:*:*", matchCriteriaId: "06FA18C8-0152-4035-8C6F-9AAC4B1985B1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn:*:*:*:*:*:*:*", matchCriteriaId: "49DB7F15-B0C2-4EF0-A3E7-6DFD03C0A25E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn1:*:*:*:*:*:*:*", matchCriteriaId: "6AE88EB7-215B-4FCA-82DD-AC2A9D243323", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xs:*:*:*:*:*:*:*", matchCriteriaId: "763A8E4B-B394-4EB2-829D-70A030551D36", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xu:*:*:*:*:*:*:*", matchCriteriaId: "198E5016-4494-4BA0-BC9A-C588264F79E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5\\)yb4:*:*:*:*:*:*:*", matchCriteriaId: "83B3A893-6322-4E04-803E-1D18224E7AF7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*", matchCriteriaId: "AEB89FCC-6602-4B41-9BFA-91B0B48827A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*", matchCriteriaId: "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5.3\\)wc1:*:*:*:*:*:*:*", matchCriteriaId: "238DCBE2-E511-42D1-B938-3FA15E4969E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5.4\\)wc1:*:*:*:*:*:*:*", matchCriteriaId: "10065276-0C45-4B35-8ACC-9EB8A73E5739", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(5a\\)e:*:*:*:*:*:*:*", matchCriteriaId: "21703640-6091-4136-A2A9-B046E0A8406E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", matchCriteriaId: "ECCE69A3-41C6-4893-86D4-7F264352C8A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*", matchCriteriaId: "C575430A-762A-405F-95DA-92589BF4C611", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)db2:*:*:*:*:*:*:*", matchCriteriaId: "1AA412BD-1EFD-4FE2-AC6D-E9AC93B1F750", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)dc1:*:*:*:*:*:*:*", matchCriteriaId: "D9E45CDF-F745-4336-B5D2-0917C66C1D08", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "AE808362-AFA6-4270-8ECE-8FFD10EE3678", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)sc:*:*:*:*:*:*:*", matchCriteriaId: "6CA0B5C8-9BB3-40BC-ADED-3A21DD019A83", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", matchCriteriaId: "FA654CE6-82C3-43D0-BAED-70E88A740BF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "1720AE47-5ED4-4E5D-AF25-F9FD7E43F6D9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "E339A080-2572-4764-BB7C-F49F66432BD0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)wx5\\(15a\\):*:*:*:*:*:*:*", matchCriteriaId: "2318131B-BA10-4C44-8F90-215CDA28576D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "E83EFCCC-D01E-4F0E-9990-1F323167B430", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe2:*:*:*:*:*:*:*", matchCriteriaId: "9E737A2B-8B1A-4F53-B1AA-ECB354D10D50", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf:*:*:*:*:*:*:*", matchCriteriaId: "0C977C71-7F61-444C-A0E4-14E5269E6B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf1:*:*:*:*:*:*:*", matchCriteriaId: "533BD959-48CF-4664-B4EC-37314AB93EFB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*", matchCriteriaId: "5EC5E6E9-E639-424B-963D-2760B2C38D8F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk2:*:*:*:*:*:*:*", matchCriteriaId: "EDDCC99B-BC23-4101-9D73-A21107FF8630", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk3:*:*:*:*:*:*:*", matchCriteriaId: "4ED4869D-EB53-4A7B-A630-69B8D76D48DE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xv:*:*:*:*:*:*:*", matchCriteriaId: "9B5AE2F8-53B5-4B13-A1DB-57E2531943A4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7.4\\)s:*:*:*:*:*:*:*", matchCriteriaId: "EB26AA22-D05C-4B88-8E1B-63A8EFE6A841", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*", matchCriteriaId: "D6833BBD-CB8C-40E3-BCB1-193E0E03A95F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", matchCriteriaId: "387FCCC1-B05D-4493-9F05-BAC5A0E57F15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "33E0F459-8A71-4FAE-BE7A-6C56E28988BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(8.0.2\\)s:*:*:*:*:*:*:*", matchCriteriaId: "F7976536-FD4C-4AE7-8838-6E28E0CFE740", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(8.3\\)sc:*:*:*:*:*:*:*", matchCriteriaId: "D7D2F695-9A42-4425-8CA6-63CB8E99F893", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*", matchCriteriaId: "4E63F87A-7BBB-4619-935E-F1F0C3C7E322", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*", matchCriteriaId: "1B6ABDAE-182B-4367-80B6-B8C8ABF92059", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", matchCriteriaId: "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "EAA03CF9-26C6-4621-B73C-EBABB20CB250", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*", matchCriteriaId: "0B94014A-8415-4174-AF4B-C9026C6EC559", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10\\):*:*:*:*:*:*:*", matchCriteriaId: "66FEB240-8BB9-4AD6-8188-836D866F4F3B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s3b:*:*:*:*:*:*:*", matchCriteriaId: "F5F41EB6-4214-4A86-BBB5-619154971F7C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "14E5113C-945B-40CB-9F5C-0B7063704364", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "AFB25BAC-590E-4496-AB43-64A8EEBFDCBB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5:*:*:*:*:*:*:*", matchCriteriaId: "75528B66-3966-4299-B9BD-69B039AB2F02", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18f\\):*:*:*:*:*:*:*", matchCriteriaId: "09DFBF77-BBE3-41BA-A6C6-32DD555F0AF0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18g\\):*:*:*:*:*:*:*", matchCriteriaId: "77D178AF-15CB-4352-8193-741F8B49688A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*", matchCriteriaId: "1863F9E2-9FFB-4C19-92E3-15DD9ED72608", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "403EE717-FD69-405C-9544-6349CBE09D1E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*", matchCriteriaId: "4CF987B2-BA35-4933-85F7-7F3F2C732961", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*", matchCriteriaId: "D77A942A-4A2C-4A87-A866-12B758DB645B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(12\\):*:*:*:*:*:*:*", matchCriteriaId: "63FACCFF-1222-4C02-A286-717E954A7ED1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "07E0B16B-D4C1-4140-830F-4F5C0D90AD42", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "A15063AA-2800-4856-B3F2-F727BE44BAA5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*", matchCriteriaId: "2B3C8355-42F3-43DE-A2D9-0B77138461FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "C9BD6B1C-DDA0-4C64-84C5-68F51BFAB457", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "050F0FAE-8871-4A14-9180-4779014D9BCF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(13\\)w5\\(19c\\):*:*:*:*:*:*:*", matchCriteriaId: "B92AE5F7-DD9A-486C-AB39-580E8E29EB75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(13\\)wt6\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "45246611-F8E6-4DD5-967B-815048CCAC65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*", matchCriteriaId: "3572607D-5E92-4706-8B83-C5CF01E63416", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(14\\):*:*:*:*:*:*:*", matchCriteriaId: "60C7CA43-AB0C-4085-BB46-78A622241E03", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "5D7B8E04-A044-4A32-ADB7-9C25B32E9F1D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "EF44B838-8E44-4281-94FD-922A60047F48", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st:*:*:*:*:*:*:*", matchCriteriaId: "353010B4-3E37-4451-9B17-EF5701DCE9B6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st3:*:*:*:*:*:*:*", matchCriteriaId: "828D84E5-E8E4-4425-9E35-B1EBDBE245BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(14\\)w5\\(20\\):*:*:*:*:*:*:*", matchCriteriaId: "4BC109F5-0907-4CDB-90BD-61788921DABC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*", matchCriteriaId: "279DBE65-0402-4205-8820-48EB20386DB9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s:*:*:*:*:*:*:*", matchCriteriaId: "E8ECE5F1-5153-4F93-9618-CF7AD2B3C426", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "9AC97D92-C82C-4CBF-93E3-4215B11FD896", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "295B139A-50F6-48E7-B42D-9A53BCA3777F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "992DF258-DAEC-4EF1-941D-7DBD347546B9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sc:*:*:*:*:*:*:*", matchCriteriaId: "52531223-05D2-41C7-ADE2-E957443297F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sl:*:*:*:*:*:*:*", matchCriteriaId: "C4E611A0-B984-47A6-95F3-B582EE0766E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*", matchCriteriaId: "6E93E4A5-6D2B-4E79-B713-7CA1BEE0E36C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s:*:*:*:*:*:*:*", matchCriteriaId: "B2BF480A-AD29-4CE3-9B88-E917D75F3FDA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "2657AD4D-F324-4527-9C4F-360946FE0D89", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8a:*:*:*:*:*:*:*", matchCriteriaId: "211CF1C3-3A5E-49CA-9D01-AC3DB4A7159E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s10:*:*:*:*:*:*:*", matchCriteriaId: "B2C19B39-258F-4A26-B751-8E9AB4807718", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc:*:*:*:*:*:*:*", matchCriteriaId: "641A5B81-B92B-4A65-9828-C7795B0AB4C9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc3:*:*:*:*:*:*:*", matchCriteriaId: "DD766E23-7CA6-4CC3-9CFF-4E81E370CFBF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st:*:*:*:*:*:*:*", matchCriteriaId: "5E68F0B5-D6B5-4012-A563-346FD83AC9B0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st1:*:*:*:*:*:*:*", matchCriteriaId: "39C3D66E-C49F-4A41-B67E-D9DE768356FD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16\\)w5\\(21\\):*:*:*:*:*:*:*", matchCriteriaId: "09D35D67-529A-425D-800A-D986297D42C4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16.06\\)s:*:*:*:*:*:*:*", matchCriteriaId: "AC8BD083-812F-414A-8E21-A8119D3ADE7C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*", matchCriteriaId: "DD09CC38-FBBD-44DD-8322-F642DC8B6F3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*", matchCriteriaId: "6342713F-C4C6-4451-9637-B744311EC287", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s:*:*:*:*:*:*:*", matchCriteriaId: "F95185E5-65CF-478B-B450-2FA9C05E4A13", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "D281BAB0-994A-418A-8FB9-C8F6509DC56E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "FB5E2F5D-ED58-44F3-A26D-D93DCF093C1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl:*:*:*:*:*:*:*", matchCriteriaId: "04586FE6-78BF-4171-8A6A-EFAC90BAC8F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl2:*:*:*:*:*:*:*", matchCriteriaId: "C4444CF9-66F8-4941-8300-4547BA7C164B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl6:*:*:*:*:*:*:*", matchCriteriaId: "33C204A1-935D-4CFF-8FBA-9A6E37597E6C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl9:*:*:*:*:*:*:*", matchCriteriaId: "C88479A3-251A-4D36-9737-CC454640E9F6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st1:*:*:*:*:*:*:*", matchCriteriaId: "6CA42C30-EB70-4030-9D02-0F3635C980EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st5:*:*:*:*:*:*:*", matchCriteriaId: "4A4EE26C-9B9D-41B5-9E0D-46D599EDE8B9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st8:*:*:*:*:*:*:*", matchCriteriaId: "1A125557-4893-4C74-800D-D5A2FCFE6C62", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*", matchCriteriaId: "A3F7B649-548F-46B5-BC0C-AB4013CF290F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s:*:*:*:*:*:*:*", matchCriteriaId: "3E4D37B0-460F-4F16-B4F4-33A4DB80FC79", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5:*:*:*:*:*:*:*", matchCriteriaId: "6018992E-1FB3-4ED8-ADC3-3BA49B76165D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5a:*:*:*:*:*:*:*", matchCriteriaId: "1FF6C534-3DF7-45A5-8F76-DF75A7EB0E97", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "684ED113-91F6-41BC-BAF5-62041D850F2A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18\\)sl:*:*:*:*:*:*:*", matchCriteriaId: "5A6E2071-516B-41B6-A897-799B66907FFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18\\)st1:*:*:*:*:*:*:*", matchCriteriaId: "2BEE0CBD-9810-46D0-87B8-0B46926C2F67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18\\)w5\\(22b\\):*:*:*:*:*:*:*", matchCriteriaId: "C6710AB1-42BC-4612-99EB-4E3C9A811E30", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*", matchCriteriaId: "8BDD3722-C5FC-4AD0-83D3-7E5D2F4B51E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*", matchCriteriaId: "13BB143D-CE87-4B5B-8B41-F641C160624F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s:*:*:*:*:*:*:*", matchCriteriaId: "53BF4CAE-9C49-412C-A3F3-F365D2E0F619", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "8DA28B36-9E53-4D2C-9ADB-C878182DB688", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2a:*:*:*:*:*:*:*", matchCriteriaId: "801F584F-A11B-4C28-BF74-2917BED984DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "CB6B7A5F-DFE1-4597-B121-BF4714CD2E3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl:*:*:*:*:*:*:*", matchCriteriaId: "8F7D5266-C127-4CF4-B1CF-3D639A9E204C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl4:*:*:*:*:*:*:*", matchCriteriaId: "A78459C5-2762-4652-8D34-772F3A025381", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sp:*:*:*:*:*:*:*", matchCriteriaId: "96C97A75-1498-40A2-8569-581FB3D13598", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st:*:*:*:*:*:*:*", matchCriteriaId: "52877E55-8DB4-4E4E-BBA1-72F2E1B0C6F4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st2:*:*:*:*:*:*:*", matchCriteriaId: "C0B9AD4E-CF9A-4772-9E84-6C11401245A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st6:*:*:*:*:*:*:*", matchCriteriaId: "5B83B0C4-897E-487E-939F-1E40144399EE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(19a\\):*:*:*:*:*:*:*", matchCriteriaId: "B9ECD6C4-10AA-4B34-96F3-7EF6A093EDE1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sl:*:*:*:*:*:*:*", matchCriteriaId: "4017470C-5EB2-4E30-834F-EAAF1738B8FD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp:*:*:*:*:*:*:*", matchCriteriaId: "67EC4390-6EDE-4235-83C9-DE8B0BE74539", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp1:*:*:*:*:*:*:*", matchCriteriaId: "3C89179A-562B-48C7-A4ED-E98ABC855972", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st2:*:*:*:*:*:*:*", matchCriteriaId: "B9032AFE-430F-409F-9558-F2179CE19087", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st6:*:*:*:*:*:*:*", matchCriteriaId: "587A531C-B3EF-4B7F-872B-7481E38BA785", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st7:*:*:*:*:*:*:*", matchCriteriaId: "2F59E7FC-C1AB-4C4F-B1A6-2A30FF64405F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sx:*:*:*:*:*:*:*", matchCriteriaId: "2B6C9A4F-1F21-4AF4-B694-6A6F3A6C2170", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20\\)w5\\(22b\\):*:*:*:*:*:*:*", matchCriteriaId: "F54D02AB-FED4-49C8-87C4-1745FA867A31", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20.4\\)sp:*:*:*:*:*:*:*", matchCriteriaId: "1AAFB5F7-4343-480B-B3DC-7ADC66582983", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(20a\\):*:*:*:*:*:*:*", matchCriteriaId: "1734A3F8-45A2-4590-9518-0753F503433D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s:*:*:*:*:*:*:*", matchCriteriaId: "2B8735B4-CD22-40E7-B7D2-C7A4B559F7D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "7EAB9029-DC45-4F55-A4FF-F6DEEDFFA150", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "F5310F83-EB1F-423C-A5EF-681FECAD66FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s4a:*:*:*:*:*:*:*", matchCriteriaId: "390D496F-AFFE-4CAA-AA27-66E8C755887C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s5a:*:*:*:*:*:*:*", matchCriteriaId: "21CB6075-DB61-4BDE-BD9E-4DBE06CF25E9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "E9AB2EF6-03CC-4C83-B81D-E7C4B2C03B82", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "6B88B203-B522-428B-A273-2DDFF9CC2898", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sl:*:*:*:*:*:*:*", matchCriteriaId: "F3408ED7-AAE8-4BD8-9A1C-B7F048C63CAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st:*:*:*:*:*:*:*", matchCriteriaId: "466E247E-5514-4489-A169-513115AB42D8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st6:*:*:*:*:*:*:*", matchCriteriaId: "7CEEF0AA-002E-4768-9302-B7CCBBF25C7E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st7:*:*:*:*:*:*:*", matchCriteriaId: "911BBC74-F18B-470A-A1E9-4D67F5866D87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sx:*:*:*:*:*:*:*", matchCriteriaId: "08A4E74E-DE87-4787-8E2E-3C7D77E02224", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(21a\\):*:*:*:*:*:*:*", matchCriteriaId: "442338B0-C242-45A1-8860-4386A5033C3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s:*:*:*:*:*:*:*", matchCriteriaId: "6070D9A2-9A74-46B1-979D-F3F80D69513E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "9DBB2CF9-2F36-4CA8-8814-C34AE5620942", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s5:*:*:*:*:*:*:*", matchCriteriaId: "7498FF80-0A4D-4510-9C1A-DA24E1A4A4E7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(22\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "312DB4D6-81B5-44C5-B99F-D56603C00B98", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "D448CA2F-8C4B-4834-8B36-B2E60D7A2D66", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "CCBAB365-6B58-44D2-A078-B3B4369CA32C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "332C413B-7AC7-4475-A968-9D0B7EF14B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*", matchCriteriaId: "35999D5E-F831-446C-B509-F1531A2D1DCD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "67DEFA98-F2AE-437A-8BE3-7F021C0AE76C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sx:*:*:*:*:*:*:*", matchCriteriaId: "02F37758-9AC2-4CAA-8A09-5A59FC622267", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sz:*:*:*:*:*:*:*", matchCriteriaId: "53D11EA0-B7E1-46F5-9FCE-0812A7DD776D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "E3630462-F414-4D6B-8766-7CED5366C852", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "1D6D0C5A-87C7-4169-B9DC-2AFA217888F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "58DF5979-73D5-4B2E-B98E-CD0AB8517F45", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*", matchCriteriaId: "1EA92F7A-C14E-4186-8E96-51D2BDC40DE0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "F451B6F0-429F-4B75-93F2-52AF4F65D3EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(24.2\\)s:*:*:*:*:*:*:*", matchCriteriaId: "8C3E9A9A-B80F-43BD-8A63-762B60D6DBE3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(25\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "3C634FD5-0716-435A-8D5A-0640DB34C069", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27\\):*:*:*:*:*:*:*", matchCriteriaId: "A0CCE7A4-A7EC-4926-90BA-B4AA87DAD99D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27c\\):*:*:*:*:*:*:*", matchCriteriaId: "00EDE5CF-FFB6-463A-B55A-53D76F3B7670", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5-27d:*:*:*:*:*:*:*", matchCriteriaId: "0D8FB0C2-4ECA-4371-B874-2496232965A7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(25.4\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "2B5A4482-9555-4DA0-87CB-3F17EE84EA2E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(26\\):*:*:*:*:*:*:*", matchCriteriaId: "C17DD4A5-9E82-49EF-965D-DF714DDBFF44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s:*:*:*:*:*:*:*", matchCriteriaId: "25058DEF-01CC-4148-923C-7AC433D82E7D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "179CEE21-E5CA-466A-BAF0-8936F2E0B06F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "2F22B210-D1B8-4875-BDF2-2BE5B116B527", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "DA1E0BA5-4A57-4D26-A453-A4D5D56DE66B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28\\):*:*:*:*:*:*:*", matchCriteriaId: "1D95BA23-C2A0-4659-B664-0B7FE74D9E34", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28a\\):*:*:*:*:*:*:*", matchCriteriaId: "FE1C0D16-5167-4A29-A8C8-3EF603AA8894", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(27\\):*:*:*:*:*:*:*", matchCriteriaId: "7A300584-6480-410F-8399-092682A62435", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*", matchCriteriaId: "00682210-2C86-4912-A423-5F7011C2FA2E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "1B5C5244-8E39-41AE-931D-D935DC3CE00E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*", matchCriteriaId: "498F4C0D-393D-4406-9752-4E49D6BB42B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*", matchCriteriaId: "E9C87916-D186-4E36-A4B6-5FA858FFC7E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv2:*:*:*:*:*:*:*", matchCriteriaId: "AAF9C316-FF3D-4C52-A770-B8597895BA06", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28\\):*:*:*:*:*:*:*", matchCriteriaId: "816276EF-A529-4522-9F49-80E9FF64F795", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "1336C42E-DA75-4DBC-81E1-70DD987EE54B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s5:*:*:*:*:*:*:*", matchCriteriaId: "8D7042F5-2878-45B2-856B-5EBC93A2BE0A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5\\(31a\\):*:*:*:*:*:*:*", matchCriteriaId: "2B74536A-EC0C-4C39-BA91-72990A4886E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-30b:*:*:*:*:*:*:*", matchCriteriaId: "37E48A25-53DE-4A07-B6B2-A275F390ABAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-32a:*:*:*:*:*:*:*", matchCriteriaId: "6C4789A3-692B-4BC4-8A91-1F576C27C8B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28c\\):*:*:*:*:*:*:*", matchCriteriaId: "43C4011A-B88C-49BD-B798-786EAC87EB59", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(28d\\):*:*:*:*:*:*:*", matchCriteriaId: "0F864A21-658C-4789-940C-E915F6C9F8A2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "D49C8C12-CE1E-41B9-991D-CC3AE51FEA8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "0F1DAEE2-8026-46DA-A652-6E0CD5A6A657", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "616EA4E3-C5FC-4145-963B-E3ABAFB5E5CF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s:*:*:*:*:*:*:*", matchCriteriaId: "3B896570-8184-4EC8-8EB3-95312E4ED869", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "5743923A-A78D-4C8C-99C5-5063A609700C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*", matchCriteriaId: "12434A88-88C6-4749-981F-E2B4D725F48F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", matchCriteriaId: "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*", matchCriteriaId: "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0ev:*:*:*:*:*:*:*", matchCriteriaId: "84299245-5091-4ED5-A107-4F7A2BE499E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", matchCriteriaId: "2C398460-3F38-4AA7-A4B1-FD8A01588DB5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", matchCriteriaId: "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*", matchCriteriaId: "2B6B0C2F-2FBE-4422-AD30-305100C595CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*", matchCriteriaId: "932C1AC0-0BD1-46DF-A241-AA71BBD785BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", matchCriteriaId: "DBEA01D2-B985-4575-AF00-144CE2E3024D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*", matchCriteriaId: "3999B90E-FE66-4B5D-8186-66C658855D7B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*", matchCriteriaId: "5C11A2BE-19E7-4148-B3CC-B4956B07273E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*", matchCriteriaId: "65E78DEE-1125-4183-A0CD-947B850E956E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*", matchCriteriaId: "B6943D9D-4A73-4EB2-B5C5-B7132AFFBE2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", matchCriteriaId: "CA7F94E8-86FC-456B-A7BB-57953F67F754", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*", matchCriteriaId: "5A92DCEF-C205-4145-91B0-DB9991130457", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*", matchCriteriaId: "C8B5CC91-144D-4818-871E-E6120A7E1050", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*", matchCriteriaId: "23E5F43E-20DA-4C5C-B8C5-1A5512CA07B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*", matchCriteriaId: "C6333F9A-2605-41EE-9AB4-1D04C5825BAE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*", matchCriteriaId: "1050ACB3-E5B2-4710-910B-F3DF4B49907F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", matchCriteriaId: "5ABE71F9-17D4-47C4-A762-18CC8716E477", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*", matchCriteriaId: "7977DA9F-41DE-4482-B0CD-896EEEFB5689", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*", matchCriteriaId: "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*", matchCriteriaId: "1ADAB898-7728-4C14-B69A-7B8B06AFC894", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*", matchCriteriaId: "DDBE69A0-85B1-423B-88FB-CDA80E9186EE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*", matchCriteriaId: "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*", matchCriteriaId: "54424787-34AC-410D-985F-511ADB2BB144", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*", matchCriteriaId: "70F54F0C-AC91-4CB7-9FEB-257F03547864", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*", matchCriteriaId: "B6A0D017-F26F-4429-891E-C7E1C66B6588", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*", matchCriteriaId: "26FA075D-4A9E-44EE-90CF-23947C9040EC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*", matchCriteriaId: "9A3DFAEC-4534-4A8D-9886-0723F57C7A63", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", matchCriteriaId: "E5451772-87D4-42E2-8F48-D137670DA3E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*", matchCriteriaId: "D162976F-87A3-42BF-8C9F-A981B14F4673", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*", matchCriteriaId: "E2606209-91BE-4BEB-A163-0D3873A033FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*", matchCriteriaId: "43581A57-418A-4A35-ACF2-1380A8DA8A82", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", matchCriteriaId: "AC17E231-9256-4600-A33B-238E7E83CF85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*", matchCriteriaId: "7A6D5468-BB6A-4665-964F-D8F636359CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*", matchCriteriaId: "F0AB67FC-88F4-42BB-BB90-54521950DE02", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*", matchCriteriaId: "4D0082D5-CE3E-433A-84E9-1311C8B7899A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", matchCriteriaId: "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*", matchCriteriaId: "7ED30640-AABE-4CA2-8B45-509270748BBE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", matchCriteriaId: "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "D86E0B83-3098-47A6-9298-43D3D5F476DD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db:*:*:*:*:*:*:*", matchCriteriaId: "960F3C8E-AB3A-4A73-A1B8-E4DD98FACF14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db2:*:*:*:*:*:*:*", matchCriteriaId: "516E4BEC-B9DA-4E21-9271-742F1CEDA087", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc:*:*:*:*:*:*:*", matchCriteriaId: "E9829AB1-BB64-4D0F-88BB-894FCF9CA2F4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc2:*:*:*:*:*:*:*", matchCriteriaId: "C0ADD1EB-B46F-4B8C-BF4D-5A9631BDFA0D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)e5:*:*:*:*:*:*:*", matchCriteriaId: "A09F6AD8-4B16-465A-9781-1B650062FB6E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*", matchCriteriaId: "96541BD7-7D90-4C56-BC23-7071A07711DA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)t:*:*:*:*:*:*:*", matchCriteriaId: "89AA56EF-E123-4539-80EA-B94965EAA2A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1.3\\)t:*:*:*:*:*:*:*", matchCriteriaId: "605C83F3-9159-4D8F-90C4-886543D2BBCA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1a\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "9EDD9202-56A8-4924-AC60-08B223D5C3DF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(1c\\):*:*:*:*:*:*:*", matchCriteriaId: "2E960CA4-679E-4748-ADDA-D122C5A2D331", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(2\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "326374ED-7ADC-457A-A8E1-4C42CDB8F3BB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "B2A0B63E-5CCF-4441-A6A1-B4EE1A556070", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf:*:*:*:*:*:*:*", matchCriteriaId: "6255AFC2-DAC7-40AE-BD1C-3BFEB5544FF0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf4:*:*:*:*:*:*:*", matchCriteriaId: "CF37C54B-72D1-4D7C-B0BA-0D9C7BA6C80A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf5:*:*:*:*:*:*:*", matchCriteriaId: "BDF1C787-B425-44FD-8C9B-8F6BFDD42BF2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(2b\\):*:*:*:*:*:*:*", matchCriteriaId: "B58DAD06-8EE4-4991-8D3F-087CB2D7B557", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\):*:*:*:*:*:*:*", matchCriteriaId: "F6812739-E9C0-425A-989D-E68CE3030E30", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)db1:*:*:*:*:*:*:*", matchCriteriaId: "7BBD302C-CA25-4DB0-9183-CCE038573D51", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)dc2:*:*:*:*:*:*:*", matchCriteriaId: "D1FBD098-4B1E-4FEA-A5CB-DDB9F1E39411", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)t:*:*:*:*:*:*:*", matchCriteriaId: "156DB723-98BC-402A-A517-18D20DA45206", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xi:*:*:*:*:*:*:*", matchCriteriaId: "02516D45-C6EB-4B06-B309-C093E4C75F0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xp:*:*:*:*:*:*:*", matchCriteriaId: "49176A2B-7194-49A3-AACA-2457F3733231", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xp4:*:*:*:*:*:*:*", matchCriteriaId: "AE045552-B648-40DA-9F78-DBF1CA8818D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xq:*:*:*:*:*:*:*", matchCriteriaId: "6C847187-D66E-4C06-BAA4-4C12DB167584", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xt:*:*:*:*:*:*:*", matchCriteriaId: "8698ABDC-307A-4187-9F53-99F1428F75D4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xt3:*:*:*:*:*:*:*", matchCriteriaId: "9F051387-6398-4880-9A57-B52C31D9646F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3a\\):*:*:*:*:*:*:*", matchCriteriaId: "652D2AD8-3C65-4EE3-95B8-C03173031367", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)e7:*:*:*:*:*:*:*", matchCriteriaId: "30142776-CF36-485C-AD6D-2F245BFD88F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)e8:*:*:*:*:*:*:*", matchCriteriaId: "CF621A5A-A65E-42C6-A046-CE995DF4CEF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "F3061CCE-5295-426D-86AD-7E3905E50E4F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)t7:*:*:*:*:*:*:*", matchCriteriaId: "35494253-675B-42E6-90CC-B5510024C4AE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)xi8:*:*:*:*:*:*:*", matchCriteriaId: "6CDE8D34-5405-45B6-BB59-3D2853123B45", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(3b\\):*:*:*:*:*:*:*", matchCriteriaId: "28E0C1D4-265E-4505-8570-CE242B5FCECE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\):*:*:*:*:*:*:*", matchCriteriaId: "F16649D4-A884-45F0-AF7C-754AC68E777D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db:*:*:*:*:*:*:*", matchCriteriaId: "EBE87A20-D684-4679-9B6E-3D945CD06CB8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db1:*:*:*:*:*:*:*", matchCriteriaId: "0D576D29-F8B4-408D-9982-0F08C6D8E862", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db2:*:*:*:*:*:*:*", matchCriteriaId: "F3EB5F43-8D46-4E53-86E1-1B151EDD8068", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)dc:*:*:*:*:*:*:*", matchCriteriaId: "AF5DEDA7-DD61-4E78-92F1-77972B1C9E98", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)dc2:*:*:*:*:*:*:*", matchCriteriaId: "41285CF3-A946-40FF-A6BB-C52713C2CBD7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "0BF1198D-69FA-48C1-A853-083CE294D2C7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)ea1e:*:*:*:*:*:*:*", matchCriteriaId: "19D7A275-0889-400E-9CAD-BE6C5FE79356", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xm4:*:*:*:*:*:*:*", matchCriteriaId: "7FDB25D1-E913-4EA1-959C-5103A860DE41", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xz:*:*:*:*:*:*:*", matchCriteriaId: "71E06301-E2D0-42EF-AFA2-3FE2EFDE1E5C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xz7:*:*:*:*:*:*:*", matchCriteriaId: "AD91CD31-9677-4CC2-A41D-FBD005E8E909", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4.3\\)t:*:*:*:*:*:*:*", matchCriteriaId: "5B7ED6DD-D86C-4BF9-8F7F-7E2383B15366", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(4a\\):*:*:*:*:*:*:*", matchCriteriaId: "3D0BE079-5746-4C3D-BA05-469C4E7F2C94", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)da1:*:*:*:*:*:*:*", matchCriteriaId: "A5F27868-5EBF-4613-B184-18F3EEF037C9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)db1:*:*:*:*:*:*:*", matchCriteriaId: "52084CCC-4ACC-40F9-8F6B-3F0C838AE330", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)dc:*:*:*:*:*:*:*", matchCriteriaId: "F9A9E4A3-5CFB-4985-A20E-F0681EF0F0DC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)dc2:*:*:*:*:*:*:*", matchCriteriaId: "32D1FD9E-5B47-4057-A6D2-ADD59B968F92", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ey:*:*:*:*:*:*:*", matchCriteriaId: "CDA17170-13DB-4019-A1C1-A4A9A00601DF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t:*:*:*:*:*:*:*", matchCriteriaId: "0C60337C-9487-47FD-95AB-8F6D012B59BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t9:*:*:*:*:*:*:*", matchCriteriaId: "6CFF4E1E-FAA5-434B-80E8-E6EBE939C6A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t12:*:*:*:*:*:*:*", matchCriteriaId: "AAF6864A-9F94-4A3F-B127-323F2220D6BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t15:*:*:*:*:*:*:*", matchCriteriaId: "EAED3057-BBBF-4A5C-B912-013307282E98", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xg5:*:*:*:*:*:*:*", matchCriteriaId: "4AC91E63-4E93-4345-BC31-C1BF979AD618", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm:*:*:*:*:*:*:*", matchCriteriaId: "A05A0F6A-B2F7-4F00-9E9C-002E0E48E1E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm4:*:*:*:*:*:*:*", matchCriteriaId: "B2F2766E-6E82-416E-A24A-04D95459F99B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm7:*:*:*:*:*:*:*", matchCriteriaId: "EA86FEC9-116E-4740-AD42-CF0093E48B71", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xr2:*:*:*:*:*:*:*", matchCriteriaId: "3ABC7C22-4E6D-4908-8F64-9EE1574DD635", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xs:*:*:*:*:*:*:*", matchCriteriaId: "8B717378-F6D8-4A15-8D79-B70EF540CBF6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xs2:*:*:*:*:*:*:*", matchCriteriaId: "55F3AF17-076E-4973-9573-DB46967F2CAE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xu1:*:*:*:*:*:*:*", matchCriteriaId: "88F46869-0883-43B4-999A-21AFCD933193", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv:*:*:*:*:*:*:*", matchCriteriaId: "F9607DFF-DD24-4BC1-BC40-04B89AB07F8A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv3:*:*:*:*:*:*:*", matchCriteriaId: "81A8947C-1B05-4EB7-86D1-003B091F8DB6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv4:*:*:*:*:*:*:*", matchCriteriaId: "F1D15335-C316-4681-87DF-C259C4A962D8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv5:*:*:*:*:*:*:*", matchCriteriaId: "BA0572EF-3070-43D1-91FE-3D33A66ED413", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xy6:*:*:*:*:*:*:*", matchCriteriaId: "41940F9E-3381-452A-BBCC-E8CC96B9070F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ya:*:*:*:*:*:*:*", matchCriteriaId: "C99915F7-2B91-4CA2-8499-F4B094475B79", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ya2:*:*:*:*:*:*:*", matchCriteriaId: "4376EDFF-B9A0-4937-AC66-38676A06272B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb:*:*:*:*:*:*:*", matchCriteriaId: "80262A82-A668-4C85-A9AA-D27DCA9C327D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb4:*:*:*:*:*:*:*", matchCriteriaId: "F3F44952-5746-4D27-8025-27FC4B4E9CD5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb5:*:*:*:*:*:*:*", matchCriteriaId: "11CA7C44-0DC9-40C4-A57B-5D108209D931", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc:*:*:*:*:*:*:*", matchCriteriaId: "C49E8DAE-2C34-4191-B888-BFF2398006E3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc1:*:*:*:*:*:*:*", matchCriteriaId: "FA64AC20-EC74-4EC4-B04B-D019F91A4A89", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc2:*:*:*:*:*:*:*", matchCriteriaId: "631B088C-18A1-411E-A62F-F0DD48832732", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd:*:*:*:*:*:*:*", matchCriteriaId: "0E13FC17-7206-4055-A46D-47421F2F07BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd2:*:*:*:*:*:*:*", matchCriteriaId: "A7353F76-EE99-48F1-A68B-BD4EAC823268", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd6:*:*:*:*:*:*:*", matchCriteriaId: "410F01C8-0A60-44C8-8906-AA8AC7D9A4D4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf:*:*:*:*:*:*:*", matchCriteriaId: "37FA259A-F5F0-4D2B-A604-47D21A694BDC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf2:*:*:*:*:*:*:*", matchCriteriaId: "128421E8-60B8-4986-8033-D0E69BB22296", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf4:*:*:*:*:*:*:*", matchCriteriaId: "0B9DD4D5-8D5E-48AF-9B33-1C25CB5E701B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yh:*:*:*:*:*:*:*", matchCriteriaId: "BC7F832A-A24B-4A4F-BB6C-5DE8A25C4B24", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yh3:*:*:*:*:*:*:*", matchCriteriaId: "251419AA-0212-4269-A4C6-5C497BD2CAD1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yi:*:*:*:*:*:*:*", matchCriteriaId: "18097A8F-588A-46B4-A203-01AFEA175595", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yi1:*:*:*:*:*:*:*", matchCriteriaId: "710E3A8C-7403-4BE5-9184-DBAF8DD218A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5a\\)e:*:*:*:*:*:*:*", matchCriteriaId: "72C05152-8070-4853-BC0A-01A0A2C226F3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5c\\):*:*:*:*:*:*:*", matchCriteriaId: "E2544486-0053-4A71-A55B-E8EC529D4794", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)e12:*:*:*:*:*:*:*", matchCriteriaId: "A661E88D-A248-4622-B667-FD2FD4AA3624", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*", matchCriteriaId: "1637C389-A962-4695-AC35-47785C205FE3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(5e\\):*:*:*:*:*:*:*", matchCriteriaId: "97B11FB8-9490-49D8-AC87-F63F48B39CF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\):*:*:*:*:*:*:*", matchCriteriaId: "4A9C34CF-FA5A-411D-94D6-3101625E871C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)e8:*:*:*:*:*:*:*", matchCriteriaId: "942A6040-051A-4FD1-935C-54CDF87C19DF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)e12:*:*:*:*:*:*:*", matchCriteriaId: "B0E5CA82-CA58-4B6B-B99E-59D905E7C304", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*", matchCriteriaId: "E1168DD8-4DF7-4A2B-B080-D267BF815F40", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*", matchCriteriaId: "CCEF5EBB-226A-4E8F-A78D-9C1754F1FBC3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*", matchCriteriaId: "3316587B-3BCE-4F4A-8835-BDC12A7F12F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*", matchCriteriaId: "148C0902-66C4-4952-8319-40B8B145A901", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*", matchCriteriaId: "1037D61F-BDE2-4956-9B27-25FD5408F1A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*", matchCriteriaId: "3CC077AA-909C-4344-B5A9-F71FBCC34B97", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ey:*:*:*:*:*:*:*", matchCriteriaId: "E4C9A6C0-F89B-4C11-B415-D78693C0E83E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez1:*:*:*:*:*:*:*", matchCriteriaId: "D2D7E0FE-ABA8-4423-A126-EE56E4AC6E98", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez2:*:*:*:*:*:*:*", matchCriteriaId: "4B3C6083-0A69-4B38-B7AC-9F7DD4D41BA8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\):*:*:*:*:*:*:*", matchCriteriaId: "2A759C05-80B5-4A5C-8B9A-C0AC13638EF8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\)ec3:*:*:*:*:*:*:*", matchCriteriaId: "93063C37-AEEA-47EE-A87A-5BB4BB76F416", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(6a\\):*:*:*:*:*:*:*", matchCriteriaId: "CDAE896A-4B97-4E67-8A55-046AB7CC0C80", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7\\):*:*:*:*:*:*:*", matchCriteriaId: "A0C0CF63-FCC4-427A-9A86-48A03D913726", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7\\)cx:*:*:*:*:*:*:*", matchCriteriaId: "DB234FEB-C185-420C-87C0-B54E9463D24D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da2:*:*:*:*:*:*:*", matchCriteriaId: "DBFE5890-AA06-40A5-B02B-F6E02D6749BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da3:*:*:*:*:*:*:*", matchCriteriaId: "0E621324-E76F-446D-9477-DE68A28206F8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7\\)ec:*:*:*:*:*:*:*", matchCriteriaId: "1481AA47-0E3F-4B64-B8EF-13358EDB4B8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)e6:*:*:*:*:*:*:*", matchCriteriaId: "7E24AB6D-AEDD-47D2-868E-7C2801B8A667", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey:*:*:*:*:*:*:*", matchCriteriaId: "0F0A9F96-4BBC-4154-8098-2E6CD2B9391E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey3:*:*:*:*:*:*:*", matchCriteriaId: "43155865-F9DF-43E9-B688-246AD46FFA4C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(7b\\):*:*:*:*:*:*:*", matchCriteriaId: "989069B1-5B8B-4F6E-BD76-3B2999F2BC5D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8\\):*:*:*:*:*:*:*", matchCriteriaId: "DF384E8C-2EB1-4747-B749-E89E25A77321", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8\\)aa1:*:*:*:*:*:*:*", matchCriteriaId: "EA2FB3CC-64F1-4204-A04B-BCED3ADE7102", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8\\)e:*:*:*:*:*:*:*", matchCriteriaId: "4D37BA51-A0F6-4CF4-A729-44C1060DEBD9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea:*:*:*:*:*:*:*", matchCriteriaId: "F1D0F1E8-B2AD-40A2-A7A5-8AF0D0198E00", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*", matchCriteriaId: "09C8E9BF-1C07-47FE-8F98-ED5960D302FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea2b:*:*:*:*:*:*:*", matchCriteriaId: "4DFD542A-C3E0-4E81-AA6C-D32BE269B6C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)e:*:*:*:*:*:*:*", matchCriteriaId: "72BC63AE-31B1-44E7-BABF-B8C529283E90", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew:*:*:*:*:*:*:*", matchCriteriaId: "429E111D-F383-4DCC-A378-D7F15234E059", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew1:*:*:*:*:*:*:*", matchCriteriaId: "F9B45852-A773-40E0-97D5-4F4A5F6E8D2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*", matchCriteriaId: "5EA87A2A-E394-4EA4-82BA-9CA3A561C8E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e8:*:*:*:*:*:*:*", matchCriteriaId: "2CD2B299-8C70-444B-9AEC-B9EAD4650C26", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e9:*:*:*:*:*:*:*", matchCriteriaId: "37EC9304-51E7-4147-820B-E6DFA9267617", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e14:*:*:*:*:*:*:*", matchCriteriaId: "DFF5CF62-C9A7-43C7-82DD-3CDAD6218D1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e15:*:*:*:*:*:*:*", matchCriteriaId: "2D1AAD07-8EA0-496D-A4A7-6DD72B711813", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e16:*:*:*:*:*:*:*", matchCriteriaId: "25619ACF-6813-4470-B1F6-0D05D155DFA0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e18:*:*:*:*:*:*:*", matchCriteriaId: "B7258C5E-8D61-4ADF-AF7D-F772C0A14C00", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e20:*:*:*:*:*:*:*", matchCriteriaId: "4859372A-D2F6-4D97-939D-91A28B65B1D6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)ex4:*:*:*:*:*:*:*", matchCriteriaId: "C47237CD-540B-462F-8B29-AC1EF4AF868B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(8c\\):*:*:*:*:*:*:*", matchCriteriaId: "3184A435-713F-499F-83D5-51233607861E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\):*:*:*:*:*:*:*", matchCriteriaId: "F2C03276-B783-49BC-841B-6A75FFDDCBF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "E8737806-D06E-4859-ABC2-B6D764AA74A4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e:*:*:*:*:*:*:*", matchCriteriaId: "61B04BC6-B6BD-4CD2-9257-B7493B33ADAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "718E435B-14E4-45AD-8565-CAE1F245772D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea:*:*:*:*:*:*:*", matchCriteriaId: "CB79AFC9-2863-4DAE-9235-56DBD7C4E066", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*", matchCriteriaId: "2465A016-415C-4EE9-9DEC-B71C3EDC0BC1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex3:*:*:*:*:*:*:*", matchCriteriaId: "71655A8A-9E5F-4B48-A490-2A3110230DCD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(9a\\):*:*:*:*:*:*:*", matchCriteriaId: "FB6D148F-D29B-4610-85EB-557AC86C7FC2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\):*:*:*:*:*:*:*", matchCriteriaId: "791F8D35-C80C-4540-9FD4-A957F429C712", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\)aa:*:*:*:*:*:*:*", matchCriteriaId: "68E75B85-BD83-4183-8738-10B7ABFCD333", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e:*:*:*:*:*:*:*", matchCriteriaId: "F32F2780-796C-4A03-BA5C-3B0CDCD2FEB3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e4:*:*:*:*:*:*:*", matchCriteriaId: "2046F5A7-EA7D-4C6F-9B93-467AB1CC2624", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec:*:*:*:*:*:*:*", matchCriteriaId: "AA022E55-1EC7-4447-8B1F-1DE2102F71FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec1:*:*:*:*:*:*:*", matchCriteriaId: "11032330-069D-4E4A-8F65-BC9EC832EC24", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ex:*:*:*:*:*:*:*", matchCriteriaId: "6B9352A8-5C48-46D7-A9B9-61C6D003E9D9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ey:*:*:*:*:*:*:*", matchCriteriaId: "401856C7-EDE5-4B89-8A09-EFC2F878E753", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10.5\\)ec:*:*:*:*:*:*:*", matchCriteriaId: "95257024-EEB8-4111-BC17-82173B759397", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(10a\\):*:*:*:*:*:*:*", matchCriteriaId: "CB900989-74D8-4DD2-93BF-5A6D50E48213", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11\\):*:*:*:*:*:*:*", matchCriteriaId: "D9B0EBB1-E870-4794-9474-F4E2A8AFEC49", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*", matchCriteriaId: "580BA1FE-0826-47A7-8BD3-9225E0841EDD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*", matchCriteriaId: "91195861-AC53-4468-B1BB-3144A6F3CB3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ec:*:*:*:*:*:*:*", matchCriteriaId: "238FC81A-606E-49ED-B97C-432A82BF7318", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11.5\\)e:*:*:*:*:*:*:*", matchCriteriaId: "F6D3C225-A31E-4E61-9B90-BBD38A8F6C0B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11a\\):*:*:*:*:*:*:*", matchCriteriaId: "330A2017-426D-4D6D-86A1-1D063038366E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\):*:*:*:*:*:*:*", matchCriteriaId: "7FC01431-DCF5-4F12-B95C-4F0813A04070", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*", matchCriteriaId: "040B04CD-B891-4F19-A7CC-5C2D462FBD6C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*", matchCriteriaId: "5BF29685-7FFC-4093-A1D4-21E4871AF5C6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*", matchCriteriaId: "E72872C9-63AF-417F-BFAE-92B4D350C006", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12\\):*:*:*:*:*:*:*", matchCriteriaId: "7DA6CBB3-6F8D-40D4-9511-C9DD6F703C14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12\\)e:*:*:*:*:*:*:*", matchCriteriaId: "5BF2C4D9-65CC-4C27-8240-C8F00F38A3F7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12a\\):*:*:*:*:*:*:*", matchCriteriaId: "F5A3BEF7-B34D-4D07-A8E6-834F555D0468", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12b\\):*:*:*:*:*:*:*", matchCriteriaId: "4DC4D8BB-2A95-4A57-AF3F-1CD01F55D62F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12c\\):*:*:*:*:*:*:*", matchCriteriaId: "93AA3BC4-C536-4EEF-85E3-D521580F18D5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)e7:*:*:*:*:*:*:*", matchCriteriaId: "2E8C082A-A9B7-4333-9ACB-CB75DCB73973", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ec:*:*:*:*:*:*:*", matchCriteriaId: "1EF8CAD4-6B77-4B1F-B3EF-05873051949C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ev01:*:*:*:*:*:*:*", matchCriteriaId: "014D2124-5158-4FCB-A831-9457CA435A03", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ew4:*:*:*:*:*:*:*", matchCriteriaId: "5E89EF44-F094-4002-A325-C765D5CB9B5F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\):*:*:*:*:*:*:*", matchCriteriaId: "7C9A3703-1082-45A6-B510-9B6C880F14A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ay:*:*:*:*:*:*:*", matchCriteriaId: "7E473130-ED52-48FA-AAAD-A1EA427AEBE9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "B9478F31-994D-4FD8-AC53-B000815FBA92", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "ADB275FD-926E-4875-AAA2-88F8DB3B8B98", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e7:*:*:*:*:*:*:*", matchCriteriaId: "D3EEC237-DD65-43F0-9DFE-0D32C929153E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*", matchCriteriaId: "80BCF196-5E5A-4F31-BCE7-AA0C748CA922", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e12:*:*:*:*:*:*:*", matchCriteriaId: "EE497DA8-240B-44DE-92F4-6CAC88A89B5A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e13:*:*:*:*:*:*:*", matchCriteriaId: "2EFCFBFD-E998-4581-B7C1-5A8BFA27DE82", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e17:*:*:*:*:*:*:*", matchCriteriaId: "337A0980-A5B4-4605-8572-8283FD1588C1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*", matchCriteriaId: "EC069569-859C-41DB-93FE-57E8B3F2EBCF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*", matchCriteriaId: "17B63153-D51A-40AE-887B-CC9362263602", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew:*:*:*:*:*:*:*", matchCriteriaId: "DB3F54C6-FD33-442F-9E82-510EA39B0A4C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew4:*:*:*:*:*:*:*", matchCriteriaId: "A6568612-226C-48A3-B619-4C540D05968A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ex2:*:*:*:*:*:*:*", matchCriteriaId: "20A9F169-F1BB-4D40-81CF-9772B4E3BFEF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(13.4\\)e:*:*:*:*:*:*:*", matchCriteriaId: "8E6CA25F-5D9A-4996-AE41-FCF9BB9A6C38", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14\\):*:*:*:*:*:*:*", matchCriteriaId: "C0097ECF-6FB0-444C-997C-7FA44E82321C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "F633F237-0B44-482F-A120-53A90EE0A328", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e4:*:*:*:*:*:*:*", matchCriteriaId: "CD0E2DFA-B2B6-4FB3-97DD-D1167014323F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e9:*:*:*:*:*:*:*", matchCriteriaId: "6277E1AB-5962-47DA-BCBB-B6BF3A5BFAB0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e10:*:*:*:*:*:*:*", matchCriteriaId: "ED09E588-89E8-416F-9A7B-0CF73807998C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*", matchCriteriaId: "F1229A52-54B6-478F-A419-8D0340336BF6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14\\)eb:*:*:*:*:*:*:*", matchCriteriaId: "2652E42C-E7FF-405A-8B6D-47C28A62757E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(14.5\\):*:*:*:*:*:*:*", matchCriteriaId: "5A69E21D-CF3F-4A57-9088-C9FF1C0ED5A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(15\\)bc1:*:*:*:*:*:*:*", matchCriteriaId: "D61DA1C6-B112-448D-8E23-07800DA3E3CC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(16\\):*:*:*:*:*:*:*", matchCriteriaId: "C2FA390A-9AE1-4C7D-906B-EFB5F927CC7A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(18\\):*:*:*:*:*:*:*", matchCriteriaId: "2A8C2D22-61C6-4CA5-A275-DAEE2CD7D3B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(18.4\\):*:*:*:*:*:*:*", matchCriteriaId: "8A4ACEAA-2B21-4C3B-AA12-235626E54581", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*", matchCriteriaId: "4944AFEF-D002-4C86-958A-4EB753399FB5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e:*:*:*:*:*:*:*", matchCriteriaId: "00DEF5CE-8637-42DA-A371-AC9BF74D213F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "970939C5-1E6F-47B6-97E6-7B2C1E019985", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e6:*:*:*:*:*:*:*", matchCriteriaId: "46C3903E-94DA-409B-A0E9-A66BCB48204E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ec:*:*:*:*:*:*:*", matchCriteriaId: "54874F5C-4165-4CFA-9908-587A808CF3A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew:*:*:*:*:*:*:*", matchCriteriaId: "184BB6B9-4E7D-4107-BFBA-847329C59209", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew3:*:*:*:*:*:*:*", matchCriteriaId: "F0B06D76-49C9-412A-95C8-4C78C303488D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\)fc1:*:*:*:*:*:*:*", matchCriteriaId: "17C19283-A797-4508-B180-0EA5A1D14310", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(19.3\\)e:*:*:*:*:*:*:*", matchCriteriaId: "4F62D015-0F71-4B7C-9B75-04F495725DF8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\):*:*:*:*:*:*:*", matchCriteriaId: "DFC9A03B-752D-4F68-B360-CBE2EDBFD8F1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*", matchCriteriaId: "D0C3B6E2-3D33-457E-B85D-8C2FC9DA2FE4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "C41AB141-A566-4738-8E07-E6410590FB0A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "F074DF74-81FA-4F09-A6E5-18DD9A4E76C1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "9689234D-7762-4BA4-827E-702407F5BDF6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e5:*:*:*:*:*:*:*", matchCriteriaId: "A390527A-7522-4580-8C0A-F68BF90A5CFF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*", matchCriteriaId: "E4041EB0-F402-4C01-9337-212E3E461AF9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*", matchCriteriaId: "00388B56-F514-4A9F-95FE-1D8239BE1EF2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*", matchCriteriaId: "0DEB16EF-D0C1-4C56-85B1-3C07D8CFD493", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*", matchCriteriaId: "DFCFD88F-4320-4F4F-9CAD-BA8A5AA5D389", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec2:*:*:*:*:*:*:*", matchCriteriaId: "D89132D4-850A-4C33-BDE4-51F6A053C848", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*", matchCriteriaId: "ABF2BEC0-6D37-4BC2-9A78-FC0D06CE7573", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo1:*:*:*:*:*:*:*", matchCriteriaId: "4BBCCE83-076A-4B0C-9331-B9FE7DA8278E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo3:*:*:*:*:*:*:*", matchCriteriaId: "AA0B22A1-8B4B-4ECD-89B3-EDB5A14D1799", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*", matchCriteriaId: "379E0F70-EE01-48F9-A4F0-BFCF9BDAB4AD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*", matchCriteriaId: "17CD0C63-7500-4A32-BD85-27E6C2F70FB3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew2:*:*:*:*:*:*:*", matchCriteriaId: "CCDFD76E-0668-4137-A747-8FDE700A3B13", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew4:*:*:*:*:*:*:*", matchCriteriaId: "17F7143A-9B42-47FC-8626-19A850A74E45", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\):*:*:*:*:*:*:*", matchCriteriaId: "8E63F79F-BF31-4076-BBCA-1BC6CC23D0CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "F7744338-A68E-4F38-8C89-E07DC4BDCFB1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "32E01A6F-E21C-414E-BCA2-F7490DC78147", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*", matchCriteriaId: "AB440BC6-9FC8-4EFD-B05E-3F5A5A68F8EF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*", matchCriteriaId: "1CF4A473-C851-4D2F-A22E-66A267A1BDB4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*", matchCriteriaId: "4DD4687F-D78C-41C8-B2B8-D140813A8619", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*", matchCriteriaId: "FB8C33CF-9FD2-4DC5-B69C-0C8E0C6A987F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*", matchCriteriaId: "1DFF09A6-DE59-4CBF-AF02-DF2862C05D1B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(22\\)eb:*:*:*:*:*:*:*", matchCriteriaId: "5F7112F7-C3AB-4B67-A58B-A04E60F5F244", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(23\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "A43DD0D6-6890-472F-AA0B-75B218FCDC6D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(23\\)e4:*:*:*:*:*:*:*", matchCriteriaId: "AB58F9A6-9298-4C47-A3C3-5C1DBF93E65A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(26\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "038514E5-49BA-4E0D-AEDB-6868117E0B25", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(26\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "0563D082-E449-40F0-93EE-437C1780CC75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(26\\)eb1:*:*:*:*:*:*:*", matchCriteriaId: "7FCF2E0B-0747-42A5-9EBC-22E81DFB2112", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(27\\):*:*:*:*:*:*:*", matchCriteriaId: "B430330A-8D7A-44F1-A338-7E6F702FB70A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1\\(27b\\):*:*:*:*:*:*:*", matchCriteriaId: "A38345DF-A94B-4C8B-9F4D-9D70BC0ECA80", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*", matchCriteriaId: "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*", matchCriteriaId: "442972CD-50D3-4C46-AB73-44AED94B9F88", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*", matchCriteriaId: "19077C39-A27B-4EC3-A882-9AC826E61570", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*", matchCriteriaId: "D3B31AFC-9C72-4737-B6B7-E938C13695BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*", matchCriteriaId: "FDEF6AED-4477-4AAC-9759-1996B77DFEE8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*", matchCriteriaId: "C9427851-B0DC-4CE6-8BFA-60619D1DC87C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*", matchCriteriaId: "6D07DD94-0925-4FEE-9565-5F36B9AAF448", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*", matchCriteriaId: "BC3A67F5-05C6-4097-A88E-0A0F165C12EA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", matchCriteriaId: "7126E176-D739-4102-8F10-1EEB8C6A219D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", matchCriteriaId: "E90C0554-1A50-4341-AB07-80AA854673D5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*", matchCriteriaId: "4A8C5149-40F8-40C9-9FC3-7E7C68801320", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", matchCriteriaId: "46FF39C5-CC37-4573-BB18-36254D38509B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*", matchCriteriaId: "C1AF45D8-A32A-482F-8183-F0DC3C4FB5DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*", matchCriteriaId: "B377A8B9-90F2-41B7-9098-5ABEB621E2E3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*", matchCriteriaId: "896A71EC-9508-406F-8DE8-58953D9A30FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*", matchCriteriaId: "E2B15FCC-1BB3-41CA-9550-6D55DD381F25", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*", matchCriteriaId: "F4A85892-C3AB-4920-A949-A71BD0332D62", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*", matchCriteriaId: "C6330829-9A7B-479D-B38B-BC64148EC172", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*", matchCriteriaId: "CF9F1E38-3482-4EAC-8654-EBC004B9344B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*", matchCriteriaId: "51BCD9C9-7E6B-42EB-A645-32B3C00CDDEC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*", matchCriteriaId: "34A61768-E18E-4DB0-9EDF-2E36D0F62DF5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*", matchCriteriaId: "E6B13CDA-C376-412A-AF5D-8FC25C74A0A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1s:*:*:*:*:*:*:*", matchCriteriaId: "4EEFAB2C-172F-45AE-9C84-A036AD22B5EF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1sec:*:*:*:*:*:*:*", matchCriteriaId: "7E3EFB16-B62B-4D24-B99F-AED2CD35C28C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", matchCriteriaId: "752C3C6B-910D-4153-A162-DF255F60306B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1x\\(l\\):*:*:*:*:*:*:*", matchCriteriaId: "3B11A6E0-36BB-44C5-893C-59AC283E515B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*", matchCriteriaId: "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", matchCriteriaId: "297FAD97-60C0-473D-A18D-03657B81B7E0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", matchCriteriaId: "2AD4A33B-B13E-40C6-B47F-A406ACC6664F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*", matchCriteriaId: "0E488E6E-87F0-4292-B97B-31087FDB4655", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*", matchCriteriaId: "0D199CB1-A2A3-4678-9503-C5B61281755C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", matchCriteriaId: "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", matchCriteriaId: "19952DC6-1186-4754-BB1E-BA1D78A19C96", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", matchCriteriaId: "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", matchCriteriaId: "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*", matchCriteriaId: "80E8AF76-0A1D-4BAE-BF10-D63080352E6E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*", matchCriteriaId: "8A11AF3F-C82F-4431-9CF1-84FDAD388D04", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", matchCriteriaId: "3B674647-4438-4450-9DCA-25184D4E2682", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", matchCriteriaId: "86E5CC41-1344-4A65-A653-8012ACE2CF2D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", matchCriteriaId: "71FB7128-CF11-4903-97D7-418403A03CD6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", matchCriteriaId: "63EFB20A-78E2-4BA1-B87C-BB74E8982D99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*", matchCriteriaId: "3A273401-9394-4BC3-879C-DE3EFC09B3F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*", matchCriteriaId: "6DABF911-FCDF-4095-A95D-4BB73628FCA3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", matchCriteriaId: "77886493-C30E-439E-BBB4-3D34A8938378", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", matchCriteriaId: "7813F511-CF6D-487F-9D1C-7A6CF85AD724", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*", matchCriteriaId: "677DC4B6-8B3D-4A0D-9934-743FD7494DF6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*", matchCriteriaId: "E272881F-0804-4190-A21D-3D0B9A774F13", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*", matchCriteriaId: "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*", matchCriteriaId: "F084DA16-24CB-41D1-92B7-C6E0499AAD10", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*", matchCriteriaId: "BA979D75-F60E-45F8-B99C-1402DC8CFCDC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*", matchCriteriaId: "194F0AB1-92E6-4CE3-A5A1-904BF75F05D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", matchCriteriaId: "884753D4-3AF0-4723-9D51-26BA7B4CA533", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", matchCriteriaId: "DAF3601D-DF44-4A10-A424-8E97C65A36A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", matchCriteriaId: "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*", matchCriteriaId: "C1835410-77EB-46F2-ACF0-379759D4B0D6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*", matchCriteriaId: "3BB103ED-B170-4193-84CD-4C59F4D6A10A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*", matchCriteriaId: "F88DCCDE-6A81-473F-B4FE-95A84F8DF964", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*", matchCriteriaId: "63D55886-268F-4E4D-B00F-8A5D97A73BA6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*", matchCriteriaId: "4F7C6FB8-8393-4916-BB2B-3097B1995C23", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", matchCriteriaId: "E4BC49F2-3DCB-45F0-9030-13F6415EE178", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "BF86B641-08DC-404A-9718-F2A99C1B0889", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)dx:*:*:*:*:*:*:*", matchCriteriaId: "324E754D-D755-4987-A892-D04A0690DD80", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)s:*:*:*:*:*:*:*", matchCriteriaId: "67A304F2-D112-47B5-8859-10FF62990368", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)t:*:*:*:*:*:*:*", matchCriteriaId: "897A6F3D-9C80-4E3E-B3E3-5CA48227CA4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xa:*:*:*:*:*:*:*", matchCriteriaId: "915157AA-15BE-4792-95D8-4D1E1EF34EB7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd:*:*:*:*:*:*:*", matchCriteriaId: "F38C9EE3-1A86-4930-AEF7-EAC3A2713DF5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd1:*:*:*:*:*:*:*", matchCriteriaId: "742CC70E-68FB-4658-A475-E7BBC5983878", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd3:*:*:*:*:*:*:*", matchCriteriaId: "10CE5741-1569-4B69-B7F7-094F0C6101AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd4:*:*:*:*:*:*:*", matchCriteriaId: "C9B4D71A-D418-4E6B-88F7-50833C00236C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe:*:*:*:*:*:*:*", matchCriteriaId: "DDD14702-51AC-46B1-95A3-4AD47A4DCD21", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe2:*:*:*:*:*:*:*", matchCriteriaId: "6FA8E55E-7E11-4D46-A1BC-B3655906FDF8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe3:*:*:*:*:*:*:*", matchCriteriaId: "6E16ED18-4EB6-40D5-A857-6398A78693D9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xh:*:*:*:*:*:*:*", matchCriteriaId: "979D4077-A3CB-4134-B180-EF10F01413BC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xq:*:*:*:*:*:*:*", matchCriteriaId: "C6C96C90-8B2D-4A88-A4B8-FA43332BD8D9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs:*:*:*:*:*:*:*", matchCriteriaId: "9C9B3920-D3F1-478F-ADE9-6022763E8740", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs1:*:*:*:*:*:*:*", matchCriteriaId: "3BC9CF50-E0F7-4513-B7EB-A2E095D3E194", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1.1\\):*:*:*:*:*:*:*", matchCriteriaId: "52332F68-2C6B-4226-9B36-345AD0A904E1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1.1\\)pi:*:*:*:*:*:*:*", matchCriteriaId: "7A1FCC6A-332A-43B9-B8D9-513D9B0DB374", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1.4\\)s:*:*:*:*:*:*:*", matchCriteriaId: "D13AA694-BAAF-4BE0-B900-4C2BCCCDA00E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1b\\):*:*:*:*:*:*:*", matchCriteriaId: "CAD94AB1-0D8D-4DBE-AB1B-6AE464743E75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1b\\)da1:*:*:*:*:*:*:*", matchCriteriaId: "AC4C28B5-4591-49E0-80F9-7C6059F24B46", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(1d\\):*:*:*:*:*:*:*", matchCriteriaId: "B2D6897E-33F3-409A-B874-501FFF989EE2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)b:*:*:*:*:*:*:*", matchCriteriaId: "9FE975E4-1D07-464A-8116-69393D07C362", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)bx:*:*:*:*:*:*:*", matchCriteriaId: "8FFF0815-8F37-4613-A54D-42D7AA299D05", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)by:*:*:*:*:*:*:*", matchCriteriaId: "CEB420B3-E9DA-4C5A-9299-FFAB48734116", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)by2:*:*:*:*:*:*:*", matchCriteriaId: "AFB7CEB1-84F0-405E-967A-A62B54B7CBCE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)dd3:*:*:*:*:*:*:*", matchCriteriaId: "5BA91C37-5799-4B30-97FF-76A6A84F3606", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "BD6F2B76-43DA-4C2B-AA6F-C6A4BBF7DE12", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "BFD6C223-10B9-4381-A4AE-77DD415B5AF6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "F1A3E8C4-0E94-4027-ABDE-47A364071D1E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa:*:*:*:*:*:*:*", matchCriteriaId: "07398411-7920-4B52-92C8-3696F49370B2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa1:*:*:*:*:*:*:*", matchCriteriaId: "371FA715-3966-4071-961F-12E691608DB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa5:*:*:*:*:*:*:*", matchCriteriaId: "3E2713E8-3E4B-4C60-9ABD-01B962A85A9C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb:*:*:*:*:*:*:*", matchCriteriaId: "5400D72E-CD49-41E7-BA47-33E3AB920320", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb3:*:*:*:*:*:*:*", matchCriteriaId: "5A44418C-C041-4A98-9D1F-1E7510B9AD1A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb4:*:*:*:*:*:*:*", matchCriteriaId: "474FA3DA-6967-48A6-AAB4-E7C382D3C942", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb11:*:*:*:*:*:*:*", matchCriteriaId: "D2808EB6-5964-4931-AEE2-BE1CF503B7E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb14:*:*:*:*:*:*:*", matchCriteriaId: "BB0CD136-C54F-41F9-9969-9F367921B03F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb15:*:*:*:*:*:*:*", matchCriteriaId: "6ABBB62E-EE60-4E80-9208-A6F5C1F80C06", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xc1:*:*:*:*:*:*:*", matchCriteriaId: "78C39B9F-E597-473E-8297-6D1E8D9713E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xf:*:*:*:*:*:*:*", matchCriteriaId: "E319FE1E-8D75-4CA2-8EA9-C1C32C290891", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xg:*:*:*:*:*:*:*", matchCriteriaId: "B82C4003-D2CD-4243-8A8D-B8A9B449D096", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh:*:*:*:*:*:*:*", matchCriteriaId: "29056463-CDD9-4399-964E-14BDBFF760A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh2:*:*:*:*:*:*:*", matchCriteriaId: "259BD3FC-FFC5-44B7-8641-917A1BF2E98C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh3:*:*:*:*:*:*:*", matchCriteriaId: "34F414DF-19C3-42BC-B43D-5CF60A3C0991", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi:*:*:*:*:*:*:*", matchCriteriaId: "E32D7BFD-EC96-464D-81CB-E9CC12C21EC0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi1:*:*:*:*:*:*:*", matchCriteriaId: "32421120-BCA2-4218-8CB3-C77452A69295", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi2:*:*:*:*:*:*:*", matchCriteriaId: "B03537E8-D899-44D5-976D-A6E10FF16FF5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj:*:*:*:*:*:*:*", matchCriteriaId: "2C4C67B0-81D3-4430-A9F7-6F15C601693E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj1:*:*:*:*:*:*:*", matchCriteriaId: "520E6B5D-C163-4633-A2DC-D02335838FDA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk:*:*:*:*:*:*:*", matchCriteriaId: "BA145839-3DC4-41C4-96B7-88B8EE87D70E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk2:*:*:*:*:*:*:*", matchCriteriaId: "1FC95C37-9102-45C7-813A-15A0ACFF5D5F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xn:*:*:*:*:*:*:*", matchCriteriaId: "0F8D649D-474E-4661-A68E-517EA3563CAA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xr:*:*:*:*:*:*:*", matchCriteriaId: "420C23F6-1E44-418F-B6CA-DECA22218B87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt:*:*:*:*:*:*:*", matchCriteriaId: "E0FEB158-215B-4C9D-8882-D44EE7F90B60", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt3:*:*:*:*:*:*:*", matchCriteriaId: "C1BD8E31-5117-4E79-92A4-5FF08BC8BB60", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu:*:*:*:*:*:*:*", matchCriteriaId: "274DF264-D0DE-46DC-A91F-DD53ACE06AAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu2:*:*:*:*:*:*:*", matchCriteriaId: "EC678F0D-4307-48B9-8C29-9E85DB756809", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2\\)yc:*:*:*:*:*:*:*", matchCriteriaId: "D917117D-CF4D-427C-8529-EB2D856E8A99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(2.2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "BCD87D10-0406-43C0-B961-47BAA4264641", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(3\\):*:*:*:*:*:*:*", matchCriteriaId: "16EA6782-77F4-4E2B-A882-A24ACEA5776B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(3.4\\)bp:*:*:*:*:*:*:*", matchCriteriaId: "80D35309-D236-4F49-88F9-AF29574630B9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(3d\\):*:*:*:*:*:*:*", matchCriteriaId: "8A33120F-F2DD-47A6-9BA3-58989C3CF448", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\):*:*:*:*:*:*:*", matchCriteriaId: "7840C1F9-C5C6-42BE-97F3-BE6F174F8C87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b:*:*:*:*:*:*:*", matchCriteriaId: "3A82EDE9-A7BD-4F36-8A97-DDDDAC45D80E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b1:*:*:*:*:*:*:*", matchCriteriaId: "8697C1FE-2EC8-4116-809D-461801FDE1A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b2:*:*:*:*:*:*:*", matchCriteriaId: "4181019C-3AF9-42A7-AD01-28B17AB6DE5E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b3:*:*:*:*:*:*:*", matchCriteriaId: "8C7265E4-1EE9-45E7-AB34-9BD6AA13E51D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b4:*:*:*:*:*:*:*", matchCriteriaId: "DB5DC2C3-1DF3-47ED-BA83-9C9FEC2FD8F8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1:*:*:*:*:*:*:*", matchCriteriaId: "5B2979C5-DAF5-4A29-BD21-F6B0173574E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1a:*:*:*:*:*:*:*", matchCriteriaId: "C8FDBABF-EDEC-4E65-925B-E4FB97FF27BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bx:*:*:*:*:*:*:*", matchCriteriaId: "90E26E18-5F6D-4C34-AD4D-CC69135DC9B9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ja:*:*:*:*:*:*:*", matchCriteriaId: "0200FB78-35ED-4CEF-A49E-52D6F8F6102D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ja1:*:*:*:*:*:*:*", matchCriteriaId: "8BCFAA1B-DDCC-4E2E-B9BF-B51E0B5710F1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb3:*:*:*:*:*:*:*", matchCriteriaId: "213AB5CB-DB2C-4939-94D7-E211AD817FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb12:*:*:*:*:*:*:*", matchCriteriaId: "76A1F18F-77EB-4BE9-AFF4-00187613E5FC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13b:*:*:*:*:*:*:*", matchCriteriaId: "C785F596-113A-4B2E-9963-4D740F15DF7C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13c:*:*:*:*:*:*:*", matchCriteriaId: "E93B704C-55B8-4FFF-8910-314604143411", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mx:*:*:*:*:*:*:*", matchCriteriaId: "FAEC62C5-DEAD-45A2-8339-EDA980833ED8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mx1:*:*:*:*:*:*:*", matchCriteriaId: "86D1C216-F510-48C6-9065-708408D8CE1B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t:*:*:*:*:*:*:*", matchCriteriaId: "8330DE9E-EF94-4402-9B3A-AA876F9F0035", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "9934E886-22CD-489D-B90B-FD23B6A2D722", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "51DD991F-682A-43E5-9BED-58F524616A9A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t6:*:*:*:*:*:*:*", matchCriteriaId: "BEA2B86D-05A1-4F17-903C-5E14A98493A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl:*:*:*:*:*:*:*", matchCriteriaId: "AEB4D744-B7FA-41E4-8272-BC71C413BAA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl4:*:*:*:*:*:*:*", matchCriteriaId: "06997F81-3A97-44C3-84B4-0868E0D20CAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm:*:*:*:*:*:*:*", matchCriteriaId: "52EA73E8-D40C-4E1D-94E9-E6FA63D7C253", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm2:*:*:*:*:*:*:*", matchCriteriaId: "4478DFE6-341F-410D-967E-EFF8B67A2E80", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xr:*:*:*:*:*:*:*", matchCriteriaId: "0570296A-6F1C-40E1-93F8-C23BF4330E2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xw:*:*:*:*:*:*:*", matchCriteriaId: "D79D38C9-271A-433C-9BED-C4893C2B0260", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xw1:*:*:*:*:*:*:*", matchCriteriaId: "5507D5CE-F07A-4BAA-96E6-96A67F4C0A3B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya:*:*:*:*:*:*:*", matchCriteriaId: "1119AC22-9A4E-468D-A9A4-27A4C9191F91", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya1:*:*:*:*:*:*:*", matchCriteriaId: "35A326CF-ED69-44A6-B7BC-3DCCC2A1766C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya7:*:*:*:*:*:*:*", matchCriteriaId: "A76FBC72-6021-4535-8CD1-DD4208FD9CAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya8:*:*:*:*:*:*:*", matchCriteriaId: "6D992EE7-4F7F-413F-9E4B-A7722249A74D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya9:*:*:*:*:*:*:*", matchCriteriaId: "2FA74A4B-A292-4825-9DDD-403A7EBAF007", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya10:*:*:*:*:*:*:*", matchCriteriaId: "A282CADD-CE0E-45F7-AE48-BC42133BF16F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya11:*:*:*:*:*:*:*", matchCriteriaId: "A89A62A5-38CE-4BA6-8330-8345BB0F7B53", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(4\\)yb:*:*:*:*:*:*:*", matchCriteriaId: "15DF8F59-0C88-4E38-B9A5-12293A2FE722", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(5\\):*:*:*:*:*:*:*", matchCriteriaId: "CC6829DD-33EA-40CE-A01B-EAA7667CBDF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(5\\)ca1:*:*:*:*:*:*:*", matchCriteriaId: "65C9A347-8EB3-4651-B7F4-BBE72E87B6DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(5d\\):*:*:*:*:*:*:*", matchCriteriaId: "6F327B39-CCBA-4B2F-A083-CEEB625BD836", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t0a:*:*:*:*:*:*:*", matchCriteriaId: "3AC7DFB1-014D-442E-B6B1-400B1F4BBDD0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t1a:*:*:*:*:*:*:*", matchCriteriaId: "C289616B-36BA-440E-8380-5523844C2C5C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(6.8a\\):*:*:*:*:*:*:*", matchCriteriaId: "D295C746-6702-4DCF-91FE-62810B37549B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(6c\\):*:*:*:*:*:*:*", matchCriteriaId: "B858AB50-2EC6-4820-801B-5EAB72A0F947", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(7\\):*:*:*:*:*:*:*", matchCriteriaId: "87CED27A-7885-4D42-8A91-128BD76EF585", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(7\\)da:*:*:*:*:*:*:*", matchCriteriaId: "A057D34A-C0E0-4DA1-8E51-2E7C2572D28A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(7.4\\)s:*:*:*:*:*:*:*", matchCriteriaId: "33AFA64E-4181-4751-B93E-EC067C97FC8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(7a\\):*:*:*:*:*:*:*", matchCriteriaId: "A65C0314-7816-40C4-9950-1B40740204E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(7b\\):*:*:*:*:*:*:*", matchCriteriaId: "84CAE9D3-209C-4663-BD5E-424928E152F0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(7c\\):*:*:*:*:*:*:*", matchCriteriaId: "191428C2-2F39-49B6-9ACA-E4C1A46F6C6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)bc1:*:*:*:*:*:*:*", matchCriteriaId: "9D67FDB9-FA6C-41F7-ACA0-AA04066B92F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)ja:*:*:*:*:*:*:*", matchCriteriaId: "D359AB74-8958-477E-8B97-F5A1FC3BDC76", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)t:*:*:*:*:*:*:*", matchCriteriaId: "402CF7F0-EC7B-474C-98F5-F9FA3486E45A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)t10:*:*:*:*:*:*:*", matchCriteriaId: "7BBE9430-02C3-41AE-899D-8935F3EF215E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)tpc10a:*:*:*:*:*:*:*", matchCriteriaId: "C0977D51-0EF6-4219-BEC9-400DF80B356C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yd:*:*:*:*:*:*:*", matchCriteriaId: "A331B245-2FFC-41AE-9E17-61F6E9AD002C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw2:*:*:*:*:*:*:*", matchCriteriaId: "139DE650-5861-495E-9B87-6C9B68AA5233", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw3:*:*:*:*:*:*:*", matchCriteriaId: "F3A7C0DB-63E2-447A-A66C-1F7419F1EB3D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy:*:*:*:*:*:*:*", matchCriteriaId: "70E5F20E-18F9-4108-AB48-E9A4DBB230B2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy3:*:*:*:*:*:*:*", matchCriteriaId: "C91D2A28-D85D-4F62-92ED-11317A9C5947", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb7:*:*:*:*:*:*:*", matchCriteriaId: "5AF4480F-6C08-43B0-92C5-3FE07B5E09D8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(9\\)s:*:*:*:*:*:*:*", matchCriteriaId: "4F575CA7-9875-4582-B9E0-446DE7227073", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(9.4\\)da:*:*:*:*:*:*:*", matchCriteriaId: "3021A9C0-3504-4B98-AD5A-9DB93E8803F8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(10\\)da2:*:*:*:*:*:*:*", matchCriteriaId: "55396406-FB71-46A6-9CDF-27F041605097", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(10\\)da4:*:*:*:*:*:*:*", matchCriteriaId: "FC774495-327F-4488-A257-1F3C5FB2E00B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(10.5\\)s:*:*:*:*:*:*:*", matchCriteriaId: "E0922A76-8F2E-4898-9AA6-32A0E3F2A8C6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(10g\\):*:*:*:*:*:*:*", matchCriteriaId: "21E013BC-9F5F-4209-9588-1A3CDB017659", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)bc3c:*:*:*:*:*:*:*", matchCriteriaId: "6B059AD2-3215-4647-B4A6-AC9642E5623E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja:*:*:*:*:*:*:*", matchCriteriaId: "665CB7BC-E97E-4461-B83B-681047A6EEAB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja1:*:*:*:*:*:*:*", matchCriteriaId: "3F7E536B-DD9A-4F46-B8C1-F29DC3298972", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t:*:*:*:*:*:*:*", matchCriteriaId: "92A9D069-4C88-4BE1-92E3-8A7056DD8825", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "F4E735E1-79B9-4FB3-B994-63D15AF6DBF4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "7861C0AC-51C3-40F4-8D72-061153D71E64", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t8:*:*:*:*:*:*:*", matchCriteriaId: "35B57355-CE86-4605-9123-15B1445C226D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t9:*:*:*:*:*:*:*", matchCriteriaId: "617CC100-06BA-4916-A2FA-EA91049DED27", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yp1:*:*:*:*:*:*:*", matchCriteriaId: "F60222E3-B02F-44B8-9E64-DB8AE3BFAEC4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yu:*:*:*:*:*:*:*", matchCriteriaId: "4B52D7F7-AC13-42FF-BBDC-FFF4A25DFD54", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yv:*:*:*:*:*:*:*", matchCriteriaId: "574C686D-F7B6-42F5-BBE6-AAA61425DF2F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yx1:*:*:*:*:*:*:*", matchCriteriaId: "62A62D04-0DD5-456D-8C13-88A0DD3E1FC2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz2:*:*:*:*:*:*:*", matchCriteriaId: "CD2FDA81-E862-45C4-BB48-152BB4C33BB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12\\):*:*:*:*:*:*:*", matchCriteriaId: "F3568B82-1112-417F-8F2A-ADAC7BE9D0D5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da3:*:*:*:*:*:*:*", matchCriteriaId: "CA67A2F1-F728-4776-AC96-0FB1C0326572", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da8:*:*:*:*:*:*:*", matchCriteriaId: "37C0F9A6-F438-44B2-8CA4-F8810160801C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da9:*:*:*:*:*:*:*", matchCriteriaId: "4DCC7A72-05CB-4283-82B8-3F5501CDF923", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12.02\\)s:*:*:*:*:*:*:*", matchCriteriaId: "E06B7024-F66C-4642-8BDB-5D88B66902DC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12.02\\)t:*:*:*:*:*:*:*", matchCriteriaId: "C8BA5828-6F26-4F92-9B22-C1A403D34D85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\):*:*:*:*:*:*:*", matchCriteriaId: "B0DDBD22-6C29-4275-9BB6-0F9E7717D382", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\)s:*:*:*:*:*:*:*", matchCriteriaId: "4569DDA0-1961-4CF2-ADBB-055144B6DDF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\)t:*:*:*:*:*:*:*", matchCriteriaId: "7A8BF6E5-BA09-4EBE-9C06-28CD8397AF69", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12b\\):*:*:*:*:*:*:*", matchCriteriaId: "FD9B22DC-353D-437E-B648-CFB39D6D34BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12c\\):*:*:*:*:*:*:*", matchCriteriaId: "DA8EA12C-A99D-4FE3-B18F-715D49764320", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*", matchCriteriaId: "9B7CC6B5-44B7-4DCA-86C8-F032AF65FDAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*", matchCriteriaId: "208A52BF-BAE3-4F5F-9279-88C360FDCBC5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12i\\):*:*:*:*:*:*:*", matchCriteriaId: "8F081454-D139-4630-BCCB-172303F78DF0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(12m\\):*:*:*:*:*:*:*", matchCriteriaId: "F440A82E-518E-4E35-AC1D-7B2BA9963EB9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\):*:*:*:*:*:*:*", matchCriteriaId: "E926A720-D79D-4A81-8E28-137CE36C4995", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)ja1:*:*:*:*:*:*:*", matchCriteriaId: "2FB70336-4345-4B02-98A9-A8F1A16657C0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)mc1:*:*:*:*:*:*:*", matchCriteriaId: "0E5B6FEA-3AD4-4401-96F6-8DC986D6509F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t:*:*:*:*:*:*:*", matchCriteriaId: "59169A2A-FC3D-4C62-BD1A-F6AB7653BC23", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "EB000AC6-C4C6-481E-A75C-7AA81BFAEE10", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t9:*:*:*:*:*:*:*", matchCriteriaId: "DFE016D9-FA6A-4FF3-9B18-7CBC37CEB136", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t14:*:*:*:*:*:*:*", matchCriteriaId: "0DF7BD28-EEC4-44C3-B54D-566A3D450D77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t16:*:*:*:*:*:*:*", matchCriteriaId: "1EBA5AA2-2AEC-4A03-98AE-F7FD59E1944D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zc:*:*:*:*:*:*:*", matchCriteriaId: "37DA4E81-4BE9-42FD-AA1E-E99FE7817FFB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd:*:*:*:*:*:*:*", matchCriteriaId: "F6F77A78-FFCE-4BD5-A027-A3AE81AE4C69", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd3:*:*:*:*:*:*:*", matchCriteriaId: "DA235645-9AC4-4876-A512-425097C5D2D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd4:*:*:*:*:*:*:*", matchCriteriaId: "8886373B-3CEF-4B67-9137-736191C10D1E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)ze:*:*:*:*:*:*:*", matchCriteriaId: "D71C31AB-60C5-41D3-9C28-E11D8C87BA15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zf:*:*:*:*:*:*:*", matchCriteriaId: "B4F26995-8997-4665-B277-42119A370FED", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zg:*:*:*:*:*:*:*", matchCriteriaId: "F2F5E02F-2EDF-4C24-8279-5602638E0E26", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh:*:*:*:*:*:*:*", matchCriteriaId: "C9585CFD-C563-4D76-A606-6C629B0BA12C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh3:*:*:*:*:*:*:*", matchCriteriaId: "D193A196-05E1-4143-961B-E8100C7A7323", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh8:*:*:*:*:*:*:*", matchCriteriaId: "4B01E7FA-7314-4E50-BFA6-3E2E5A4552D6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zj:*:*:*:*:*:*:*", matchCriteriaId: "C3BAAAC5-FD95-48C1-9834-A0BD5BB16699", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zk:*:*:*:*:*:*:*", matchCriteriaId: "A47C78ED-4BEA-4DC9-8FF4-11DD8803AAB7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zl:*:*:*:*:*:*:*", matchCriteriaId: "E4CE1FD8-530B-4530-9109-76F852C196FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13.03\\)b:*:*:*:*:*:*:*", matchCriteriaId: "64098AE7-DEB7-4D7B-801A-AF624C9E00FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13a\\):*:*:*:*:*:*:*", matchCriteriaId: "02879682-3521-4E10-95C7-4F3C3B488B04", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(13e\\):*:*:*:*:*:*:*", matchCriteriaId: "20087BA2-1C64-4741-BF0B-7DF45DCC9364", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s:*:*:*:*:*:*:*", matchCriteriaId: "1B721725-3499-4653-8489-A0337FE08215", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s13:*:*:*:*:*:*:*", matchCriteriaId: "C6181F56-00F9-4FF6-8285-271D9E1FEA5E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s14:*:*:*:*:*:*:*", matchCriteriaId: "8EC33DFE-2514-4A75-AB59-8EA0C03187B4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s15:*:*:*:*:*:*:*", matchCriteriaId: "034A3445-32E6-4CCE-89A4-DDB6DE25A9BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)su2:*:*:*:*:*:*:*", matchCriteriaId: "C7682BC6-5FF5-449A-905D-2178C16361F0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sx1:*:*:*:*:*:*:*", matchCriteriaId: "77C60F5A-0478-4CF1-B621-4B747DD02A77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "CD1F4148-E772-4708-8C1F-D67F969C11DA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*", matchCriteriaId: "3CEBCEF0-5982-4B30-8377-9CAC978A1CB0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy03:*:*:*:*:*:*:*", matchCriteriaId: "936E22FD-5210-46F7-89E5-5458A9C58F77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*", matchCriteriaId: "C6D9BA55-F193-4BCA-ACC2-BBC892E9D7E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*", matchCriteriaId: "46974023-379B-4475-A59F-BD340043CFAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*", matchCriteriaId: "D71C21E1-BC04-4537-B64D-76492F282B76", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za:*:*:*:*:*:*:*", matchCriteriaId: "26835676-2738-47CB-A364-78D1964FEC4D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za2:*:*:*:*:*:*:*", matchCriteriaId: "209A1BE7-EEFC-476E-84E4-4EFD68DD7E81", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za8:*:*:*:*:*:*:*", matchCriteriaId: "9B9BF07C-DB46-4646-A11D-FFC5C13D6387", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14.5\\):*:*:*:*:*:*:*", matchCriteriaId: "9802FF68-2932-42F6-B66F-545A59FB5EB7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(14.5\\)t:*:*:*:*:*:*:*", matchCriteriaId: "0E51D01E-F3CB-4413-985E-D72F71D7B423", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)b:*:*:*:*:*:*:*", matchCriteriaId: "7F3DF4A1-DF61-46CB-AFF5-9B7DD6F93317", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc:*:*:*:*:*:*:*", matchCriteriaId: "EA8421C4-3CB5-40B8-AB20-5E883FAC276C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1:*:*:*:*:*:*:*", matchCriteriaId: "D9CDFBF7-D393-42F5-89A8-482459A426A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1f:*:*:*:*:*:*:*", matchCriteriaId: "D2D17BA6-BA60-4019-8034-302777B06CB8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2f:*:*:*:*:*:*:*", matchCriteriaId: "9185C8A1-426B-4313-832F-18B2F9507DD4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2h:*:*:*:*:*:*:*", matchCriteriaId: "3F4938C9-0511-4AC3-85F0-44A0AC8D5820", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2i:*:*:*:*:*:*:*", matchCriteriaId: "9D137683-0B21-45E4-AA17-FCFA1085499D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bx:*:*:*:*:*:*:*", matchCriteriaId: "864B17DA-90A8-40F0-8885-3F9E47589131", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bz:*:*:*:*:*:*:*", matchCriteriaId: "31E2E42C-DB5E-4534-9BE5-E2717E96C784", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)cx:*:*:*:*:*:*:*", matchCriteriaId: "32737FE9-2E17-4DA9-B3DD-6B5A4CBE2C40", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)cz3:*:*:*:*:*:*:*", matchCriteriaId: "CAF872FE-9B30-4D0B-B129-6A317176A517", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk2:*:*:*:*:*:*:*", matchCriteriaId: "6C5B2939-F4F2-409F-8FFB-AC7B0D6C7B2E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk4:*:*:*:*:*:*:*", matchCriteriaId: "1562A3BE-7447-4227-BD04-33C248F04C85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk5:*:*:*:*:*:*:*", matchCriteriaId: "711839A6-984E-4341-B7A0-DFEDC31FBF23", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc1:*:*:*:*:*:*:*", matchCriteriaId: "5C02477E-BBB9-49A2-94CC-9457DC928EB4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2c:*:*:*:*:*:*:*", matchCriteriaId: "05CA5BF4-05BD-4B26-A49F-AB3897B563CE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2e:*:*:*:*:*:*:*", matchCriteriaId: "2360BC32-F9AD-4407-9BB2-C19CC190B1E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)sl1:*:*:*:*:*:*:*", matchCriteriaId: "E5B71B83-3E4E-4ADE-97CE-F72B52E41BB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t:*:*:*:*:*:*:*", matchCriteriaId: "284DFE38-63FE-45CC-8CF7-B84050674EBA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t5:*:*:*:*:*:*:*", matchCriteriaId: "9A424753-62C6-466F-BD19-047A1611A4FC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t7:*:*:*:*:*:*:*", matchCriteriaId: "C1A353C2-69AE-4343-A6FF-E0736836EAD1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t8:*:*:*:*:*:*:*", matchCriteriaId: "56E5E477-2236-45DC-900E-75FAB2E7DFE6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t9:*:*:*:*:*:*:*", matchCriteriaId: "A67A7F96-5B78-4466-B5D4-3811C6DE7A1D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t15:*:*:*:*:*:*:*", matchCriteriaId: "CA1CEF76-1CB2-45BA-856C-3E23668DF0E0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t16:*:*:*:*:*:*:*", matchCriteriaId: "DDB35113-BA54-4DAF-A293-2B6B328A5CE1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t17:*:*:*:*:*:*:*", matchCriteriaId: "7BC5651C-AA17-4275-997F-C85FB48D7ED3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)xr:*:*:*:*:*:*:*", matchCriteriaId: "CC2B0007-128F-4B50-A7B5-3985C40890A2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)xr2:*:*:*:*:*:*:*", matchCriteriaId: "A12EE4BC-9C6D-4791-B99C-5F1F0B89BA41", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)ys:*:*:*:*:*:*:*", matchCriteriaId: "77166237-71D5-40EF-AE47-32CE7BC300BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)ys_1.2\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "882715D1-D669-4107-A39F-41C27084B2E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj:*:*:*:*:*:*:*", matchCriteriaId: "FE530211-6ECF-4881-A069-826E0737CE5E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj1:*:*:*:*:*:*:*", matchCriteriaId: "2C5C18D0-B516-4F5A-AB43-B3D5FBB14202", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj2:*:*:*:*:*:*:*", matchCriteriaId: "0CB1FC76-DFCC-4F06-A320-82C27A502B07", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj3:*:*:*:*:*:*:*", matchCriteriaId: "C17E0E7D-E7C0-434D-9142-F8A93BF63FCF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zk:*:*:*:*:*:*:*", matchCriteriaId: "C81871C3-7AB6-41A1-BECF-2F34ED208E5E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zl:*:*:*:*:*:*:*", matchCriteriaId: "9FFB25CF-C329-46A0-A404-36D951C7A0B8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zl1:*:*:*:*:*:*:*", matchCriteriaId: "D6CD80CB-7E2D-4DC0-A84E-D9E1ADFA141F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zn:*:*:*:*:*:*:*", matchCriteriaId: "776DCDA0-839D-4EA2-8C0C-D28E897C1E71", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zo:*:*:*:*:*:*:*", matchCriteriaId: "55827F80-F1A1-4538-85C0-069413E3DB80", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(15.1\\)s:*:*:*:*:*:*:*", matchCriteriaId: "2C4B7EF3-FD99-4CCD-B05A-807EE53A58BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(16\\)b:*:*:*:*:*:*:*", matchCriteriaId: "CF6730C6-1387-4A52-8778-7FC144134AC6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(16\\)b1:*:*:*:*:*:*:*", matchCriteriaId: "4D461538-0218-40E9-A74A-9982E4075485", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(16\\)bx:*:*:*:*:*:*:*", matchCriteriaId: "79433418-CB13-4F11-B606-3D804926BB43", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(16.1\\)b:*:*:*:*:*:*:*", matchCriteriaId: "AB1A7354-F886-427D-943A-388824100550", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(16.5\\)s:*:*:*:*:*:*:*", matchCriteriaId: "A0C0B5AD-229E-4406-A5E6-190067352BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(16f\\):*:*:*:*:*:*:*", matchCriteriaId: "680AC7AF-998A-4584-8087-9409A7407AFB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17\\):*:*:*:*:*:*:*", matchCriteriaId: "D298FE2E-227C-4385-9DFA-55A2D5C04E02", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17\\)a:*:*:*:*:*:*:*", matchCriteriaId: "DCF5B18A-3F59-4CED-BADD-6C7E41E2A28A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17\\)zd3:*:*:*:*:*:*:*", matchCriteriaId: "3B284ED6-7182-4138-9111-8DE89F9EBD77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17a\\):*:*:*:*:*:*:*", matchCriteriaId: "2A28E43B-9153-4491-AA25-0011732C6E4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17a\\)sxa:*:*:*:*:*:*:*", matchCriteriaId: "CE7F49F3-0A0A-4270-A657-CDE987637684", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17b\\)sxa:*:*:*:*:*:*:*", matchCriteriaId: "5BC22162-36D7-43C0-966C-2DD62CA1DD6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17d\\):*:*:*:*:*:*:*", matchCriteriaId: "3514C99A-95B8-4827-A9D4-E8E851D7FB2D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sx:*:*:*:*:*:*:*", matchCriteriaId: "8089D89D-AF38-4445-82BE-61FF2ABFEF0D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb:*:*:*:*:*:*:*", matchCriteriaId: "E947BE8B-DB42-45E9-89E9-2E42DF6242F3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb7:*:*:*:*:*:*:*", matchCriteriaId: "E30C6E0A-6D9F-43EF-A202-678BAC2C9950", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb8:*:*:*:*:*:*:*", matchCriteriaId: "95CE4197-A9D6-4DF5-A8F9-8E1520D80D70", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb10:*:*:*:*:*:*:*", matchCriteriaId: "0E2A7C58-5AF1-4486-B81D-A68DC3D738AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(17f\\):*:*:*:*:*:*:*", matchCriteriaId: "75999E88-10C0-4F99-9F2E-7F2325E2737A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew:*:*:*:*:*:*:*", matchCriteriaId: "9E49B392-5366-422D-A10E-EE4F3A33C4B9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew2:*:*:*:*:*:*:*", matchCriteriaId: "D11BE83A-EE4B-4495-BAEF-EA4802FE5376", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew3:*:*:*:*:*:*:*", matchCriteriaId: "A077B6B3-F0CA-45BC-8A62-EAC12EB28FBC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew5:*:*:*:*:*:*:*", matchCriteriaId: "44E46610-76B6-4C7D-AC8B-64B24CFBE303", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ewa:*:*:*:*:*:*:*", matchCriteriaId: "7EF707A6-5834-4295-8B38-17F279D49C82", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*", matchCriteriaId: "2D0E67EE-AF42-4B53-B70A-45562CE164D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "D8942C0A-8DDB-46CA-81CA-0DA442C27502", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "9C7979BB-03BD-495B-8C4A-EF916AC5B546", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s9:*:*:*:*:*:*:*", matchCriteriaId: "0BCFBB45-4784-490A-BDD2-DA2D54C792B8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s10:*:*:*:*:*:*:*", matchCriteriaId: "8E3AC772-803C-499C-85E7-7176688DCB4C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*", matchCriteriaId: "9E319ADC-C636-4933-BD50-B613677AD4C0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)so4:*:*:*:*:*:*:*", matchCriteriaId: "8AF320DA-468E-4E40-A55E-E74EA44A3122", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv:*:*:*:*:*:*:*", matchCriteriaId: "1A15042D-EB07-4754-8144-947CDE669CAE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv3:*:*:*:*:*:*:*", matchCriteriaId: "3DC2BB88-ECB4-4F93-BDE7-8486852AB27A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sw:*:*:*:*:*:*:*", matchCriteriaId: "E58F4903-E834-4476-876F-8C144BD93D4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd1:*:*:*:*:*:*:*", matchCriteriaId: "6D890842-FBBC-4D2F-8403-E8FF383A0289", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd4:*:*:*:*:*:*:*", matchCriteriaId: "5A59C144-2B35-470D-BF33-29CA7EFF2ED0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd5:*:*:*:*:*:*:*", matchCriteriaId: "8F0B9E6B-439F-4623-BE70-68F1835747BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd6:*:*:*:*:*:*:*", matchCriteriaId: "086B1BAC-0C9A-40C7-BEBB-FF0E1FC72463", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd7:*:*:*:*:*:*:*", matchCriteriaId: "B94D83AD-D5B4-4968-8080-92CE49A1494C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe:*:*:*:*:*:*:*", matchCriteriaId: "5AF6A337-FE37-4CE2-B0FC-AB0AE099C10F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe1:*:*:*:*:*:*:*", matchCriteriaId: "0076A522-5490-4D31-A10A-3611B587E5C7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe3:*:*:*:*:*:*:*", matchCriteriaId: "A041C16C-8A48-4470-B1E9-3159C3463A99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf:*:*:*:*:*:*:*", matchCriteriaId: "6A523641-0044-4A2A-9097-D32504F2A019", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(18.2\\):*:*:*:*:*:*:*", matchCriteriaId: "C20E75F7-CEF6-4985-942D-F054879C312D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(19\\):*:*:*:*:*:*:*", matchCriteriaId: "532987C6-8D68-40B0-ABB3-236C49A63D31", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(19\\)b:*:*:*:*:*:*:*", matchCriteriaId: "9045CACC-F1AE-4924-94FE-825DE629C415", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*", matchCriteriaId: "522425D5-1EFE-4F07-88FE-9EE4376D7171", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*", matchCriteriaId: "145A21CA-3E35-4F73-9451-72EF1265ECA2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*", matchCriteriaId: "47186E81-9EAD-4AD6-B888-F1F94C2EA128", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew:*:*:*:*:*:*:*", matchCriteriaId: "955BF110-FFBE-4368-BE06-21AC794C53AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew2:*:*:*:*:*:*:*", matchCriteriaId: "11DBF354-E96F-41C8-A393-077682738B4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew3:*:*:*:*:*:*:*", matchCriteriaId: "93FC49A2-CB0C-43CB-86F2-2D4483CFE5F3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*", matchCriteriaId: "E0F08381-956E-4E97-8226-6EDC66C281D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*", matchCriteriaId: "54CCAA24-53BB-4998-B986-358701A8A8F1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*", matchCriteriaId: "7B2560DA-E091-4344-A7D0-9BEEB6998AC3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*", matchCriteriaId: "10151339-0261-4F5D-9601-F048C0B70908", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "2498113D-65B7-4144-AD1C-9FCB6534B7BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "84685E46-066D-42B4-8800-7D529AFC4FAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "99299759-15D1-4BEB-95D3-8D53C27674A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "2A4528A0-A342-482E-BF87-AB4B7EC69C0E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "1B2C7EF6-410E-4D27-8C09-D0CEFDA360AF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s9:*:*:*:*:*:*:*", matchCriteriaId: "326FC2B8-62F0-46B9-961F-4D5526D41A7B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*", matchCriteriaId: "BEA90AE6-0BC8-442E-81F3-49E6C8D71F72", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*", matchCriteriaId: "9324BF58-67E2-410D-AA71-F280B3D64498", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*", matchCriteriaId: "060D7CA2-0A02-49E3-BCFB-EFE7F6EC08F6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(21b\\):*:*:*:*:*:*:*", matchCriteriaId: "D3AAE391-8039-4BCA-851E-CC3992BE7F75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(22\\)ea6:*:*:*:*:*:*:*", matchCriteriaId: "848E6315-3901-48C5-95F4-81A397485C47", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*", matchCriteriaId: "2B20E6F8-5E33-4F24-BB8B-8B61E39C01E1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(22\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "F657AFFB-B3C7-419F-82A2-B244186EDD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(22\\)sv1:*:*:*:*:*:*:*", matchCriteriaId: "777381FD-8BC0-49AF-A4D9-83FC7E601BBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*", matchCriteriaId: "947062EE-A5CF-4A7F-8EF7-921F45118268", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(23\\)sv1:*:*:*:*:*:*:*", matchCriteriaId: "099D2308-DAFA-4790-AFD8-066B841CD0C8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(23\\)sw:*:*:*:*:*:*:*", matchCriteriaId: "2C78ECAE-978F-4DDE-83D4-DCF4ECC20EAE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(23.6\\):*:*:*:*:*:*:*", matchCriteriaId: "24044D5B-B73A-4873-A36E-E35B8A6AB087", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(23a\\):*:*:*:*:*:*:*", matchCriteriaId: "04D1C25C-1BED-41F9-8CCC-044065B7572A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(23f\\):*:*:*:*:*:*:*", matchCriteriaId: "62B55C5D-F153-47CC-8E79-94B6451D04A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(24\\):*:*:*:*:*:*:*", matchCriteriaId: "2F4E83FE-4A5F-49A1-B6E5-B39171AA8825", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(24\\)sv:*:*:*:*:*:*:*", matchCriteriaId: "F69F16A8-ED8E-4B89-AA80-CEF9C488A03D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(24\\)sv1:*:*:*:*:*:*:*", matchCriteriaId: "016CB579-0452-4DFE-8CDE-D3161579DDDD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*", matchCriteriaId: "878773DC-1360-4608-AB17-0081B33B11F2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*", matchCriteriaId: "0C2B085A-57AF-4A84-A354-166E61B5CAF2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*", matchCriteriaId: "A35979BE-B33F-4709-8B36-FB8297E321FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*", matchCriteriaId: "66130668-1107-42B3-BFAF-5640D3AC7595", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ex:*:*:*:*:*:*:*", matchCriteriaId: "7346EC5B-4F87-423A-A579-AE0E1583190A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*", matchCriteriaId: "C22E4042-3628-4A7E-BD93-1F3F282F9E14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*", matchCriteriaId: "A84C2CA8-1BA4-4899-9AFF-443FBC5003D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*", matchCriteriaId: "7B5E50CF-9084-459B-AFE5-5E0C63E17AB4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*", matchCriteriaId: "CFC9A8EF-FE37-42CB-A33F-4B6AF29A8827", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*", matchCriteriaId: "B0C9F1F1-EA5E-4921-A862-06304CE55C4E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*", matchCriteriaId: "8508A0FF-D18D-430C-9A26-6B5BBFD7DF70", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*", matchCriteriaId: "393A274B-BAA4-46F3-BC35-BE697B96A684", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*", matchCriteriaId: "DA143186-1E3B-4B5F-A5FD-AE90A2664AFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "A4912CA3-2311-4D0F-8767-6815F43BE645", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "092374D9-6DFE-45A8-B3F1-562C56787304", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "B5E5E380-4843-4E2F-8807-BFBDB42CB734", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "065CBFDD-BF57-4FE4-A48E-03CFDE5530B8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*", matchCriteriaId: "36953AD6-CE36-480E-8679-DE5EEBCC5A26", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*", matchCriteriaId: "F571ECA8-0AB1-4BC0-A6AE-06BAE1FD2375", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*", matchCriteriaId: "7E67F0D3-5722-49F3-80FA-8BA7292C085D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*", matchCriteriaId: "DA79BC8E-753F-4245-9885-A7A2733E4013", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*", matchCriteriaId: "6B820873-78DF-401B-8A99-EB1F115FED35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*", matchCriteriaId: "86F88317-18BE-4484-A027-D69500937799", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*", matchCriteriaId: "DF6CCDEE-0D38-4C6B-82D8-CDE5067CC704", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*", matchCriteriaId: "0C342FEA-F2AC-4E0C-946E-1F7DB2994D14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*", matchCriteriaId: "3B142BAA-613A-40F8-9FD2-EB081867B3F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sv2:*:*:*:*:*:*:*", matchCriteriaId: "D1036B4D-4666-4BCC-9345-2DEAD2F49ABB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw:*:*:*:*:*:*:*", matchCriteriaId: "3A3C8845-179E-4098-842D-2F886885CFFC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw3a:*:*:*:*:*:*:*", matchCriteriaId: "16F5683A-5EA5-4991-A677-2390477BA8A1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4:*:*:*:*:*:*:*", matchCriteriaId: "CBF0E312-0A76-47FD-BCFD-39ABDDDB99A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4a:*:*:*:*:*:*:*", matchCriteriaId: "5B3D41BA-41BD-4F4A-9CD5-1EDA026F0979", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(26\\)sv:*:*:*:*:*:*:*", matchCriteriaId: "183C82F0-09A5-406F-9362-E268335D4F99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(26\\)sv1:*:*:*:*:*:*:*", matchCriteriaId: "5A1F98B3-23E1-475E-8CC4-7E39D091BDD4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(26b\\):*:*:*:*:*:*:*", matchCriteriaId: "A40966B8-23E0-4ADC-BCEB-74DC2FA7EA3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbc:*:*:*:*:*:*:*", matchCriteriaId: "6ADFC5FC-CE15-4C83-8E11-7CC29EE8F32A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(27\\)sv1:*:*:*:*:*:*:*", matchCriteriaId: "BD3C951B-527D-4C0E-A1AF-D0F6871AEB6F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(27b\\):*:*:*:*:*:*:*", matchCriteriaId: "85D4091C-087D-4267-B606-664EDA55DE5C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(28\\):*:*:*:*:*:*:*", matchCriteriaId: "968C42F5-9FB5-4442-9314-9D0156DA4719", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(28c\\):*:*:*:*:*:*:*", matchCriteriaId: "1625DE6D-5848-436B-A220-C0D1EE3ED0F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(29a\\):*:*:*:*:*:*:*", matchCriteriaId: "9F018CEF-2A91-4067-8104-63686F9489CC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(30\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "84F12CDE-0C47-433D-81CC-EE33C3C36B86", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2\\(31\\):*:*:*:*:*:*:*", matchCriteriaId: "9D5BAE50-27D4-4BAC-9C15-0EC889139144", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*", matchCriteriaId: "E314B0F7-1A27-483E-B3B3-947A5561281F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*", matchCriteriaId: "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*", matchCriteriaId: "05B838C9-E60E-46A3-A5FB-4F67291D0851", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*", matchCriteriaId: "2B29F111-CBA4-464D-8B25-C2677BA270EC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*", matchCriteriaId: "E96C76C5-52BA-45D9-9803-048E770BAA84", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*", matchCriteriaId: "42EB3A6A-8B37-47E6-AA9B-1B13FC08F542", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*", matchCriteriaId: "22D57BED-1D99-4077-941C-E60BEA65324E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*", matchCriteriaId: "F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*", matchCriteriaId: "78B9E2C6-0E23-4AC9-906F-28BBC15868DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*", matchCriteriaId: "B7F75542-F2C5-4CEB-B655-E0620408A3B8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*", matchCriteriaId: "7B7EA3DA-33B3-4480-B3B8-413745D6C5FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*", matchCriteriaId: "BDC41749-91FC-43DB-A52F-AC3E3A2205C7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*", matchCriteriaId: "EE0195AE-24FD-43B2-892B-F646B8B5ED6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2e:*:*:*:*:*:*:*", matchCriteriaId: "84E71A69-60C3-4F63-B368-A9AEE6E501A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2eu:*:*:*:*:*:*:*", matchCriteriaId: "FCA9F8FF-94EA-4D1D-93AE-623075014426", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*", matchCriteriaId: "316924D4-10D4-4C98-AF05-DDE1D530A205", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*", matchCriteriaId: "11866346-C29A-463D-A18F-528C23DD579E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*", matchCriteriaId: "0912492E-565A-4559-ABB8-D2898F06CF29", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*", matchCriteriaId: "2CD6421A-D8C4-4A3E-9497-4AC130CFE597", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*", matchCriteriaId: "91F44EC8-13BF-4032-9EBA-0D50C6A353BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2f:*:*:*:*:*:*:*", matchCriteriaId: "FD1C019A-0B91-4A3C-98DB-F467C054AA15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*", matchCriteriaId: "370EEE74-3DAA-4BB2-9192-66672229DC39", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*", matchCriteriaId: "4CF74B28-CD95-4BC6-97D4-D529D30E1509", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*", matchCriteriaId: "B98E703A-717D-4997-AFBC-CAE4B644025D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*", matchCriteriaId: "01A0A03A-5BFE-4A15-A983-B3EB8EE6B25A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2jx:*:*:*:*:*:*:*", matchCriteriaId: "9A4BC2FA-19F0-41FC-9786-8006B1D2E7DC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*", matchCriteriaId: "6B27825D-099A-4733-8D3F-8EF2B050E5B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*", matchCriteriaId: "D3A63E2B-8C1B-4EF7-BCDD-BBF3EC2C7113", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*", matchCriteriaId: "ED8A1FE0-F74A-4C92-8625-7C933128B567", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2n:*:*:*:*:*:*:*", matchCriteriaId: "0E90AD18-3ED7-4DA9-A6DF-281C1F3226D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2pb:*:*:*:*:*:*:*", matchCriteriaId: "CB3BD76F-F93A-4902-B4F6-4D9231C29EDF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2pi:*:*:*:*:*:*:*", matchCriteriaId: "2AD6BA55-0A6B-4981-AA70-4D1FDD49B996", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*", matchCriteriaId: "2D035A35-D53E-4C49-B4E4-F40B85866F27", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sa:*:*:*:*:*:*:*", matchCriteriaId: "3CC41CCD-96B0-493D-B206-37773FD65388", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*", matchCriteriaId: "F1579A2D-955F-4CC6-9F94-9D40C669D903", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*", matchCriteriaId: "F05A548B-C443-4C15-B636-64C1F9B9860D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*", matchCriteriaId: "87DC8B40-2093-4D3A-B18B-F95868A36D8E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*", matchCriteriaId: "CFB7E760-8260-4488-B9FB-C741C1763F40", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*", matchCriteriaId: "A8F4B373-490C-463F-B518-89D0CABB852C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*", matchCriteriaId: "E85ABE5E-7900-4A9C-A945-48B293EF46B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sh:*:*:*:*:*:*:*", matchCriteriaId: "BA4B787E-5700-44B8-8C98-24DB1983AE44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*", matchCriteriaId: "AD1A9400-571E-4955-AB84-C49A4255A5B0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*", matchCriteriaId: "FC70491B-F701-4D33-A314-C686469DBD2C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*", matchCriteriaId: "198C24E9-6D45-44FD-B502-D14ACDA99EDA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*", matchCriteriaId: "5DEF14D5-1327-4012-913F-DA0E12C4E953", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*", matchCriteriaId: "4DE0B5B8-DEB1-4021-B854-177C0D9FD73A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", matchCriteriaId: "E7A672BD-87AE-424D-8735-073BBE9CE164", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", matchCriteriaId: "95C033E3-184B-4AC1-B10D-8318FEAF73FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", matchCriteriaId: "FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*", matchCriteriaId: "5A68D177-B028-4025-BD7B-82ACDB2D1E21", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", matchCriteriaId: "485ACF9E-1305-4D71-A766-5BE1D748AAA3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*", matchCriteriaId: "09458CD7-D430-4957-8506-FAB2A3E2AA65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*", matchCriteriaId: "6E709D6B-61DB-4905-B539-B8488D7E2DC0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", matchCriteriaId: "84900BB3-B49F-448A-9E04-FE423FBCCC4F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*", matchCriteriaId: "F6C1C831-556D-4634-AA24-6D64943ED275", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2x:*:*:*:*:*:*:*", matchCriteriaId: "1975B29A-42E5-4DB8-928C-F8F775DAA3E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*", matchCriteriaId: "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*", matchCriteriaId: "075CD42D-070A-49BA-90D9-E7925BB41A38", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*", matchCriteriaId: "DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*", matchCriteriaId: "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*", matchCriteriaId: "746DDC61-3981-4E93-A7EE-C120E0265485", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*", matchCriteriaId: "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*", matchCriteriaId: "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*", matchCriteriaId: "4628FDA0-4260-4493-92C9-4574E5EC06A2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*", matchCriteriaId: "F9FA064A-6E1A-4415-84D4-1A33FF667011", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*", matchCriteriaId: "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*", matchCriteriaId: "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*", matchCriteriaId: "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*", matchCriteriaId: "21147732-FA22-4728-B5F2-D115B78A8EDB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*", matchCriteriaId: "4D717498-4DF9-4D15-A25B-D777FF460E3A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*", matchCriteriaId: "4B40548F-3914-4227-9E4C-F1B34071C069", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*", matchCriteriaId: "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*", matchCriteriaId: "ECE49281-0571-49F7-95FF-68B1ACA07537", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*", matchCriteriaId: "9B09B72E-6862-4115-9A0B-574089A94289", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*", matchCriteriaId: "EC38B64C-E246-467F-A185-669497DEA839", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*", matchCriteriaId: "FBB42063-9DB5-42DB-825A-53C6DBB51A57", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*", matchCriteriaId: "6E5C90EE-A9C0-461C-9E89-732BFA9BD066", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2xz:*:*:*:*:*:*:*", matchCriteriaId: "972EC35D-B727-49A0-A0F1-654FD4E9576C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*", matchCriteriaId: "E74B6350-C2F8-4786-8E32-2ED6C188A5E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*", matchCriteriaId: "F8E26473-A8EF-44C5-B550-5E0B86D31291", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*", matchCriteriaId: "663FE3CE-FA09-46A2-9C0D-2797D9137A82", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*", matchCriteriaId: "86309E93-F2C9-4334-9A1C-989EFDC99215", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*", matchCriteriaId: "761D49D6-0624-41CE-829E-49E7EA679EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*", matchCriteriaId: "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*", matchCriteriaId: "65318A70-40FF-4BE8-962B-DFCD5C476166", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*", matchCriteriaId: "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*", matchCriteriaId: "552C1E7A-2FFA-49BC-BF09-F0DE9B0C7502", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*", matchCriteriaId: "869CEAF7-59D6-4651-8D89-0244D6C430A2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*", matchCriteriaId: "059FBAA6-3127-4DF9-99AD-AA3A16317B6D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*", matchCriteriaId: "0E0E376F-64E1-4632-9A8E-11DC99FB245F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*", matchCriteriaId: "BF440B52-C6AE-4608-BE71-01B354D37BEE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*", matchCriteriaId: "243BEF5E-F693-450E-B274-FD7CF34B6771", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*", matchCriteriaId: "E7918C59-1678-4F24-A7C2-68824D1B59A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*", matchCriteriaId: "DE72804E-600D-47FA-B3BF-36BD3CF13A75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*", matchCriteriaId: "DAD14B6D-CA11-41C1-9382-70CF1F5B4C8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*", matchCriteriaId: "7F5B9BAF-59BA-4282-B387-489264D44429", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*", matchCriteriaId: "969A5BAA-19D5-4411-BABB-FE55DBA7C7D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*", matchCriteriaId: "54B41182-7AA8-49D1-BAC3-EAF312E43553", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*", matchCriteriaId: "E11BBB83-147B-4FBF-B263-77FCCFB2D92D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*", matchCriteriaId: "2E84677D-793D-44C5-80E9-FC29C3183278", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*", matchCriteriaId: "E70E5B1F-E72C-4DAB-B6FA-977EF04BFBDA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*", matchCriteriaId: "ECFA2358-6B79-472D-9092-FF99DC3DF042", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*", matchCriteriaId: "A3C26842-FF50-436F-8DB6-15A70082CD1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*", matchCriteriaId: "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*", matchCriteriaId: "9384B48D-0F62-4042-BE8F-9A8F5FE9A3D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*", matchCriteriaId: "F4A31301-AAB0-4744-98B2-695D88798D9D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*", matchCriteriaId: "ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*", matchCriteriaId: "0CEB27CF-46B5-4780-964C-C31193614B74", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*", matchCriteriaId: "0F1094F9-7222-4DE0-A368-7421ABA66E3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*", matchCriteriaId: "6C7EA2BB-A52A-438C-8EB5-CD283CACBACE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*", matchCriteriaId: "574FFD6F-D56C-41DB-A978-E501BA3CA5D8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zi:*:*:*:*:*:*:*", matchCriteriaId: "41E5674D-D1D3-4597-8105-F787465E00A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*", matchCriteriaId: "11790F38-3720-45CF-9FD4-A8E5867684D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zk:*:*:*:*:*:*:*", matchCriteriaId: "00462296-DF61-4438-818D-C240BFFCCD71", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*", matchCriteriaId: "4AE2282B-6693-4E4B-8662-501EBC14CD9E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zm:*:*:*:*:*:*:*", matchCriteriaId: "9AD345EA-D5E8-420B-98D0-92674BEBEEED", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*", matchCriteriaId: "56365432-1E57-4D35-B764-DDDA878B96ED", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*", matchCriteriaId: "390755B3-30B7-4086-8FB2-A41614F747D8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*", matchCriteriaId: "A925BA5C-AB2F-4B73-BA93-55664A319CAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*", matchCriteriaId: "94E748F5-FA9B-4627-AB30-5414A2952ADB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*", matchCriteriaId: "0668C45B-9D25-424B-B876-C1721BFFE5DA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(1a\\):*:*:*:*:*:*:*", matchCriteriaId: "6C2928F8-6C6B-4C3F-BBE7-EAE8A0C47E77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja:*:*:*:*:*:*:*", matchCriteriaId: "5BC51475-7819-4C46-AF3C-251520C3EEFB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja5:*:*:*:*:*:*:*", matchCriteriaId: "B5538B7E-6AB4-4DB5-920F-EC2BA61DF73A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk:*:*:*:*:*:*:*", matchCriteriaId: "C8011951-B642-4706-8936-74DCB59304C9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk1:*:*:*:*:*:*:*", matchCriteriaId: "042B6178-F186-40F3-A1AB-51AEAFCB7244", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "19940BFF-0888-4717-AC5F-87A85BE165A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)t8:*:*:*:*:*:*:*", matchCriteriaId: "35C4D3D1-5E63-4A1E-BF9B-588FFE5790B1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa4:*:*:*:*:*:*:*", matchCriteriaId: "D94D6CD6-3AF5-4CC6-991D-3D8C229A1C16", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa5:*:*:*:*:*:*:*", matchCriteriaId: "60704633-BFAB-486F-A613-A806733E9AB0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*", matchCriteriaId: "9E5A2A58-D7B2-4018-BAAE-D6CB49A3A709", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*", matchCriteriaId: "1C268494-F83A-488D-AEE6-AF7D319B6F64", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc3:*:*:*:*:*:*:*", matchCriteriaId: "484207D7-0AC2-48B6-B86F-182651B6BBB3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc4:*:*:*:*:*:*:*", matchCriteriaId: "0CC53452-31E6-4C9D-88DF-4AD17609DBFD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe3:*:*:*:*:*:*:*", matchCriteriaId: "5BF6C6D9-A2BD-469E-AA75-18C063A435D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe4:*:*:*:*:*:*:*", matchCriteriaId: "6BE48276-21BF-4275-8512-4C5401423064", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(3e\\):*:*:*:*:*:*:*", matchCriteriaId: "40DD5508-B8BF-435C-B316-42FEDDDBA859", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(3h\\):*:*:*:*:*:*:*", matchCriteriaId: "114B5329-6A76-4BE9-AA57-3463D614D495", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(3i\\):*:*:*:*:*:*:*", matchCriteriaId: "CDC06EA9-D4D9-42EE-8A98-598356707894", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)eo1:*:*:*:*:*:*:*", matchCriteriaId: "8FF2F9E9-AA00-4A78-A32C-14CAA1C171A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja:*:*:*:*:*:*:*", matchCriteriaId: "2DEA47B2-B51E-4C9C-A9C7-DFC680B32986", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja1:*:*:*:*:*:*:*", matchCriteriaId: "A2530834-81C3-4524-A4F0-B4F77DBAEB65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*", matchCriteriaId: "68BCC003-3F88-4369-A387-6B8D0FDFBE32", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "8DD45AA0-EEE1-43FF-B04D-4063769D71AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "7873D1DB-80D0-4076-8716-7618D7161EE2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "DF292613-B9BC-4CF1-A6FA-4AFC077D8632", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "208EF5CB-8131-443A-928B-391104DC1C26", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t8:*:*:*:*:*:*:*", matchCriteriaId: "3115134B-46F9-40F0-9ABD-3F35EE635EA3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)tpc11a:*:*:*:*:*:*:*", matchCriteriaId: "0B810AFB-3555-4882-B12B-9DA52AD37AC3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*", matchCriteriaId: "23B1AF9D-106A-43CB-972C-5E85ADFC355D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*", matchCriteriaId: "25C6BBA6-8D45-4BA7-B88E-44D9ECE88009", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd2:*:*:*:*:*:*:*", matchCriteriaId: "C1D460AE-3B86-4178-A9D4-172AD4AF1DF5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xe4:*:*:*:*:*:*:*", matchCriteriaId: "552EB570-BFD6-4BBE-805B-41A9A5AE35B1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg1:*:*:*:*:*:*:*", matchCriteriaId: "A6DFEF95-E48F-4586-9D70-89C192FD21E8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg2:*:*:*:*:*:*:*", matchCriteriaId: "77E1EA17-0717-4715-9F2E-48264E18885B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg4:*:*:*:*:*:*:*", matchCriteriaId: "DACA1E35-3681-4E2C-BAB2-DAD99F24F8DD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg5:*:*:*:*:*:*:*", matchCriteriaId: "6EB85916-14A8-4D16-8BE0-D99B8E5B020E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xh:*:*:*:*:*:*:*", matchCriteriaId: "6BC5ED4F-1905-4EAA-8AFF-BC50B879725C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk:*:*:*:*:*:*:*", matchCriteriaId: "F672CDF2-ACC2-485E-89C6-42E47974C8C0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk1:*:*:*:*:*:*:*", matchCriteriaId: "09C47064-BDD5-4EE7-BAB1-E8FE21EB7DE8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk3:*:*:*:*:*:*:*", matchCriteriaId: "AC204B9A-1C01-4900-B515-5796B0B06E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk4:*:*:*:*:*:*:*", matchCriteriaId: "79A06F5D-ADA4-44C6-84EA-7229428B7AE8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq:*:*:*:*:*:*:*", matchCriteriaId: "67151B56-DD5F-4384-9651-FA927CE73D08", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq1:*:*:*:*:*:*:*", matchCriteriaId: "111C62A4-9DF0-4317-9F95-0112BE24D727", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*", matchCriteriaId: "8CF0189B-964F-46EC-BE5F-8076CFE7AB8F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5\\)b1:*:*:*:*:*:*:*", matchCriteriaId: "691E3441-AF70-4959-BBA0-60F5328F8FF9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*", matchCriteriaId: "53430E70-FBAD-42F7-8614-7AB04E566810", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*", matchCriteriaId: "B670057C-7A86-4F61-8FF5-88E6BFE2B5F1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b2:*:*:*:*:*:*:*", matchCriteriaId: "5FC9F410-782A-416C-9E10-AF43D5BD44FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b5:*:*:*:*:*:*:*", matchCriteriaId: "27107AB2-87AB-4909-9F6D-352BA94F8032", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*", matchCriteriaId: "4403BFFB-8A89-4512-8030-5DEDC0C0FF93", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5c\\):*:*:*:*:*:*:*", matchCriteriaId: "DE38549C-107E-4350-90F2-BA928E3872AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5e\\):*:*:*:*:*:*:*", matchCriteriaId: "7601422B-1C22-44D2-A398-1586814A9F7D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(5f\\):*:*:*:*:*:*:*", matchCriteriaId: "40B9FEE8-FFBB-46E6-A1EA-A243A0073853", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*", matchCriteriaId: "2D9B4FE3-7A03-430F-AE68-743559D74DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(6a\\):*:*:*:*:*:*:*", matchCriteriaId: "6F5C4FD2-E4BC-447D-8B3B-0248BFBE9121", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(6d\\):*:*:*:*:*:*:*", matchCriteriaId: "67BBFB86-2745-4817-9516-50CB08AAA82D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(6e\\):*:*:*:*:*:*:*", matchCriteriaId: "6F645CEE-083C-412E-BCEF-2761AC266CD5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(6f\\):*:*:*:*:*:*:*", matchCriteriaId: "B5CCD5B9-0771-47B3-A280-6566A489A5AF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja:*:*:*:*:*:*:*", matchCriteriaId: "56529125-65D8-4900-A741-0AE18852B7A6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja1:*:*:*:*:*:*:*", matchCriteriaId: "4DF14EE4-1D49-4E1B-9589-2F3A8BF3E3E1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx:*:*:*:*:*:*:*", matchCriteriaId: "3029C050-D02D-4DA3-B8B9-901F808BBDD6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t:*:*:*:*:*:*:*", matchCriteriaId: "1BEADF66-3434-41E0-9527-4D97F1836A76", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "C3C82EB5-8397-4C0D-8074-7B55D83708B3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t8:*:*:*:*:*:*:*", matchCriteriaId: "E6735142-065C-4AA2-B78A-FCD7CA8CB50F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t9:*:*:*:*:*:*:*", matchCriteriaId: "337C0195-34F6-4683-A944-2F698A677476", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t10:*:*:*:*:*:*:*", matchCriteriaId: "75901574-5BDD-4388-96F9-A2B4E9970F77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t12:*:*:*:*:*:*:*", matchCriteriaId: "6BBCC011-54AB-4E8E-BC20-68E6F274D323", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi3:*:*:*:*:*:*:*", matchCriteriaId: "FD0A3B5B-4E6B-437A-B355-D9DCDF078201", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi4:*:*:*:*:*:*:*", matchCriteriaId: "689D066C-972F-4868-A6A3-2F5522489D89", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi7:*:*:*:*:*:*:*", matchCriteriaId: "63CA13FE-93EF-414A-A8D5-333D4A5B9320", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr3:*:*:*:*:*:*:*", matchCriteriaId: "B19F9376-BE29-4F08-B86F-E1634FF750F3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr4:*:*:*:*:*:*:*", matchCriteriaId: "68DC1732-CED8-4FA6-9A75-000BABBEA5C7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr6:*:*:*:*:*:*:*", matchCriteriaId: "570AF3F9-D3F5-44B1-82A1-3C7966A27BD1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(7.7\\):*:*:*:*:*:*:*", matchCriteriaId: "5719F49C-0BCC-40F9-825A-4C3C9D4D2239", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja:*:*:*:*:*:*:*", matchCriteriaId: "4701FFB8-6361-4B0F-B413-2649A6FC650E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja1:*:*:*:*:*:*:*", matchCriteriaId: "80CC4D9F-F7C1-4887-BDC6-62F4BDFE5079", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "21932884-D10B-4C2D-99C5-ED4DE3DA38E7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t7:*:*:*:*:*:*:*", matchCriteriaId: "AC4C56D7-435E-4AE3-BAE8-96A6EAB57488", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t8:*:*:*:*:*:*:*", matchCriteriaId: "C44A3B72-EFF5-460D-8EE0-13782AAFDB20", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t9:*:*:*:*:*:*:*", matchCriteriaId: "378FFEBE-3815-4293-943E-86771AB6D63D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t11:*:*:*:*:*:*:*", matchCriteriaId: "BDB99DAF-0BF1-43FE-8263-AF8F5EEA7D59", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xu2:*:*:*:*:*:*:*", matchCriteriaId: "B78D2BD4-CD3F-40D2-8F0F-FC765A9B1ADB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy4:*:*:*:*:*:*:*", matchCriteriaId: "A66A1B2C-D653-4275-ADC5-6298A70C939D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy5:*:*:*:*:*:*:*", matchCriteriaId: "76DFDE5D-231C-4B79-85CF-2B2097E12437", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy6:*:*:*:*:*:*:*", matchCriteriaId: "BA6F2B19-7FF1-45E7-91B6-A427343099DF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ya1:*:*:*:*:*:*:*", matchCriteriaId: "64F0AD5B-4C2D-4C9D-8207-0A67F9AF995A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yd:*:*:*:*:*:*:*", matchCriteriaId: "B91192EA-0320-43D1-8D73-FAD57CC18259", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yf:*:*:*:*:*:*:*", matchCriteriaId: "7CC57A97-0A3C-466F-AA15-5D97AC528503", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg:*:*:*:*:*:*:*", matchCriteriaId: "581D9245-944E-4464-924B-6CB1E874FFEA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg1:*:*:*:*:*:*:*", matchCriteriaId: "FE205377-1B09-4498-8538-F2B7DF91E579", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg2:*:*:*:*:*:*:*", matchCriteriaId: "ADBBB1FA-5FA9-4042-AE12-F39307C27F8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg3:*:*:*:*:*:*:*", matchCriteriaId: "8108DEF0-102A-452B-9B94-D5AAA3918322", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yh:*:*:*:*:*:*:*", matchCriteriaId: "B4666469-0A0F-4D28-8A1E-39D82ED210CF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi:*:*:*:*:*:*:*", matchCriteriaId: "61130D36-B1EF-41F1-AF14-57475BE25FB7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi1:*:*:*:*:*:*:*", matchCriteriaId: "AAD8A9BF-F084-447C-B28C-2736E8C3A83D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi3:*:*:*:*:*:*:*", matchCriteriaId: "A515A997-5922-4C07-9C68-0D071E811F2A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(9\\):*:*:*:*:*:*:*", matchCriteriaId: "21837255-F23B-488A-A9FB-ED984020147D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc:*:*:*:*:*:*:*", matchCriteriaId: "51F92965-6498-40EC-8AF7-D31466F973A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc2:*:*:*:*:*:*:*", matchCriteriaId: "9417A9B3-CAD8-4E69-9871-484DED263683", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc6:*:*:*:*:*:*:*", matchCriteriaId: "39601936-034D-4F48-9F02-0F0E251E34F6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc7:*:*:*:*:*:*:*", matchCriteriaId: "F3761893-292D-41E8-9800-C888B235E6F8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(9d\\):*:*:*:*:*:*:*", matchCriteriaId: "57EE4026-2A06-4E63-924C-43E663EA47DC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(9e\\):*:*:*:*:*:*:*", matchCriteriaId: "DAF8B6B9-3023-4C33-AFB1-C8C4E1504178", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(10\\):*:*:*:*:*:*:*", matchCriteriaId: "697C9EFC-7B70-438F-A418-AEFA22841655", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(10c\\):*:*:*:*:*:*:*", matchCriteriaId: "9FF6B0F5-0E61-4ECC-B329-80ABCAED3057", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(10d\\):*:*:*:*:*:*:*", matchCriteriaId: "19F6275E-146F-4B70-B14C-D857DDA13819", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(10e\\):*:*:*:*:*:*:*", matchCriteriaId: "9F590204-33CC-4A6A-9C37-380ADC15813A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\):*:*:*:*:*:*:*", matchCriteriaId: "EDCFFDE0-284E-4107-98DA-C30724E4BF82", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t:*:*:*:*:*:*:*", matchCriteriaId: "CE4F50FF-2A42-4BE6-84D8-C6C2A5938125", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "B48ACEA8-6E12-40CF-868B-DE343BEBFE41", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t5:*:*:*:*:*:*:*", matchCriteriaId: "71775098-8BA1-442F-9709-0BCE255DD773", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t6:*:*:*:*:*:*:*", matchCriteriaId: "8355DB7C-2E2C-4108-BD0F-361B0B898D1E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t8:*:*:*:*:*:*:*", matchCriteriaId: "D80E065F-ABB5-4824-9C59-A53690B0CD1F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t9:*:*:*:*:*:*:*", matchCriteriaId: "4A4E3DC5-0F83-42DE-9482-92DB413DCDE0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl:*:*:*:*:*:*:*", matchCriteriaId: "C63FEE13-5E2A-4011-B720-63EFAFF55049", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl3:*:*:*:*:*:*:*", matchCriteriaId: "81FACB05-B13D-494E-8AA3-5590391E6F88", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf:*:*:*:*:*:*:*", matchCriteriaId: "84E27655-2889-4B2A-9C48-ADD48ED5B365", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*", matchCriteriaId: "7F58FC83-C321-4A9F-8EE2-1531B73E064C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf3:*:*:*:*:*:*:*", matchCriteriaId: "4C7D8166-6522-437F-AEDE-2AC02913FC87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf4:*:*:*:*:*:*:*", matchCriteriaId: "B805F909-5650-4884-9990-F3776DF203AD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yj:*:*:*:*:*:*:*", matchCriteriaId: "C705B7F5-2BE4-45F9-8B5F-9FAC900FF6D1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk:*:*:*:*:*:*:*", matchCriteriaId: "F5610D63-0E50-4AB3-A6F7-36BCF7F69EF7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk1:*:*:*:*:*:*:*", matchCriteriaId: "17F5092A-473E-4356-9EFB-9E3EBFCD5F13", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk2:*:*:*:*:*:*:*", matchCriteriaId: "DF310185-68F5-48BB-8E11-E38E1961B380", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yl:*:*:*:*:*:*:*", matchCriteriaId: "19E24302-D04B-45D1-AC6A-0CE45F9B9F71", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yn:*:*:*:*:*:*:*", matchCriteriaId: "723B58EA-9686-425C-99DD-FBECDF6E2225", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yr:*:*:*:*:*:*:*", matchCriteriaId: "E3EA745A-8AFE-4461-AB53-1FC71E080BC5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys:*:*:*:*:*:*:*", matchCriteriaId: "E109B3D5-90BB-45B6-8265-B32465AC85E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys1:*:*:*:*:*:*:*", matchCriteriaId: "C441F423-86ED-49DF-8BFC-3CA988C9177A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yw:*:*:*:*:*:*:*", matchCriteriaId: "68D39082-D9B4-4AD2-BA93-D688E098F037", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(12\\):*:*:*:*:*:*:*", matchCriteriaId: "F4F0BFAB-D26C-4D17-B5AB-647780423E8F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(12b\\):*:*:*:*:*:*:*", matchCriteriaId: "E59A3B6E-59F6-47B1-BC28-C0B171F1E1F4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(12e\\):*:*:*:*:*:*:*", matchCriteriaId: "9B3FBFC2-0628-4A56-A96C-904807E85B49", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(13\\):*:*:*:*:*:*:*", matchCriteriaId: "8B69920A-6775-4D3B-81A8-F971875C43D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(13a\\):*:*:*:*:*:*:*", matchCriteriaId: "4093FE1B-3B95-4F25-AAF5-329FEBE0F0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc:*:*:*:*:*:*:*", matchCriteriaId: "B9411EF8-54EF-49CB-BA09-3AE1133D3146", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc1:*:*:*:*:*:*:*", matchCriteriaId: "71AA815E-CD4A-44D5-A772-93CB340E7998", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(13b\\):*:*:*:*:*:*:*", matchCriteriaId: "31AB99B6-84C5-426A-A037-5022FD00E6C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*", matchCriteriaId: "D32302AE-54E2-423A-A418-6C7EAE2CDF0A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "6F616AE0-42B4-403B-B610-99DE15EE490D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "EFCEBBD5-FA7F-4478-8F00-AC6CA598CADC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*", matchCriteriaId: "68A83281-667D-4D1A-9F76-CFF3E5AD560F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym4:*:*:*:*:*:*:*", matchCriteriaId: "40FD8309-111A-45BC-819A-99FE9E002ACF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq:*:*:*:*:*:*:*", matchCriteriaId: "42C7F308-DB1C-4500-81E4-9E3325D58A92", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq1:*:*:*:*:*:*:*", matchCriteriaId: "FCD9C9A9-9B90-479A-9D2D-8681056892AC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq3:*:*:*:*:*:*:*", matchCriteriaId: "19661048-2B60-437E-9D56-9189BFC4C8F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq4:*:*:*:*:*:*:*", matchCriteriaId: "FF870144-DFCD-4ADC-A695-3DF9266890EC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt:*:*:*:*:*:*:*", matchCriteriaId: "D389A57A-005E-40B1-8DFC-3347F67F19F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt1:*:*:*:*:*:*:*", matchCriteriaId: "FC7CEBAF-65BB-4A89-8C3B-CEF1052D99E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu:*:*:*:*:*:*:*", matchCriteriaId: "3B311DEA-F602-49DA-8208-353D2D33283F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu1:*:*:*:*:*:*:*", matchCriteriaId: "A14407B6-FEC1-4FD8-8359-CA3EC5477B13", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(15\\):*:*:*:*:*:*:*", matchCriteriaId: "CD190476-DC7A-4033-9149-062D75704AD1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(15b\\):*:*:*:*:*:*:*", matchCriteriaId: "C4510B95-F9F7-4407-B00F-F91B352C99C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3\\(16\\):*:*:*:*:*:*:*", matchCriteriaId: "E236CDE4-3369-4CDF-B0F0-4888610CCFC0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*", matchCriteriaId: "292F6F99-19B3-4106-A432-5DE916CCDD56", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*", matchCriteriaId: "40183EF8-BD19-49AD-9E55-7FCCA635327F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*", matchCriteriaId: "B8E40D5D-F46E-4098-A46A-1A52A343310D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*", matchCriteriaId: "550709E5-9302-4FCB-A969-2DA54BCB2184", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*", matchCriteriaId: "D73E5138-016A-48EC-A367-3D3285AAFED2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*", matchCriteriaId: "C114F1A6-5DFE-408F-B83A-E8B9D4AF9791", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*", matchCriteriaId: "9CD5C082-9730-466D-A4A8-E4EEE5F3730D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*", matchCriteriaId: "8CF419BD-8474-4F33-9CDD-587E341ABA8D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*", matchCriteriaId: "332B0446-4D8B-414B-B572-84B45D5643AE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*", matchCriteriaId: "D40FB896-E20C-46B1-BF59-FBB42295F9C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*", matchCriteriaId: "C0C3B413-76F7-413B-A51F-29834F9DE722", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*", matchCriteriaId: "841CDC5F-8F0E-4AE7-A7A9-960E0A8C66B9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*", matchCriteriaId: "84C89CFF-64BB-4058-9C49-C6BF3E5D8DB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*", matchCriteriaId: "ACB3B5E3-BDEE-4F29-AB02-BBFC6088D77E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*", matchCriteriaId: "A9F12741-69FB-46DD-A670-8461492B338A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*", matchCriteriaId: "7EC2D158-6174-4AE8-83DA-125B072B6980", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*", matchCriteriaId: "A5688D88-A550-43EB-8854-2E132EC71156", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*", matchCriteriaId: "8218E2D3-4F1E-440F-A2B2-A68D4692BB17", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*", matchCriteriaId: "6BE2132D-CF21-49F1-BC66-FA6CDB6D72BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*", matchCriteriaId: "E2E3044F-3CE8-4970-9A7F-FDF555F622A6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*", matchCriteriaId: "AA212293-7BAF-4AD9-BD30-E953CBA7CB95", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*", matchCriteriaId: "CEF3B2A9-027B-4141-B0FB-D31A2C918CF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*", matchCriteriaId: "1018E04C-5575-4D1A-B482-D1CDB9AD6A50", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*", matchCriteriaId: "68FC4904-1F4D-4E10-AF95-911B07827598", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*", matchCriteriaId: "AB57AAA9-4715-468F-A734-A12209A6069F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*", matchCriteriaId: "480D480A-80A3-4113-A1A6-194A8DD47F65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*", matchCriteriaId: "86B9E611-3F06-424C-96EF-EE4997C70AB9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*", matchCriteriaId: "E0A5760A-9FFE-4941-B2BD-7DD54B1E1B37", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*", matchCriteriaId: "98FE195E-084B-4F4C-800D-850165DED48C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*", matchCriteriaId: "1A310F30-F94D-4A70-94BD-6B94D7B5F5B4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*", matchCriteriaId: "FB74F350-37F8-48DF-924E-415E51932163", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xv:*:*:*:*:*:*:*", matchCriteriaId: "72732395-1B82-4E4F-9D63-D1CA0C6BD929", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*", matchCriteriaId: "E618BF54-56DC-40FC-A515-3BFB4366F823", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*", matchCriteriaId: "A1976E53-85A6-494F-B8AC-847E7988850C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*", matchCriteriaId: "D90B78E1-3FC7-4CF6-B0BA-1D4CA0FAB57E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*", matchCriteriaId: "9A668D08-14C4-4438-A59C-CE60498BEF8B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*", matchCriteriaId: "320C5597-68BE-4899-9EBB-9B4DEE8EA7DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*", matchCriteriaId: "56032FBD-FEE7-4B38-B35E-CD277B931DE9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yc:*:*:*:*:*:*:*", matchCriteriaId: "75CF930C-6871-4BCB-8605-B71F82455123", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*", matchCriteriaId: "520304A4-EB15-42A8-A402-8251A4D2076D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*", matchCriteriaId: "F80A9B6F-A5D8-403C-9018-0E627FBC9A0E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*", matchCriteriaId: "C46B66D6-1BF1-4DCA-868F-BADE3CB96063", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*", matchCriteriaId: "CA88C064-898F-4C0D-A266-D7B3509C28A2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*", matchCriteriaId: "139B1182-61A3-4F3D-9E29-758F27917646", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*", matchCriteriaId: "0CC3706F-B00A-405E-917E-7FD5217E0501", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*", matchCriteriaId: "1B46199E-0DF1-4B3F-A29E-1A2FC016F0F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*", matchCriteriaId: "1DF4D0E3-8015-4D6F-8364-B6EEAAE67971", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*", matchCriteriaId: "6F2BCA9F-5D56-4EF4-8675-7B76129B994B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*", matchCriteriaId: "2595DCBA-E6F2-4551-A804-4DBB137F076B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*", matchCriteriaId: "09698AAF-F4D1-41EE-A960-38FAB645B5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*", matchCriteriaId: "CD6DF12B-2A20-4AC5-8EC5-729008D87736", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*", matchCriteriaId: "1B75FC35-2B4D-4CEE-BE71-D497DF787123", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*", matchCriteriaId: "6BF9D6B6-E51F-44FF-97E5-15E0C4E9C3D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*", matchCriteriaId: "A25C42FA-37F4-4B7F-AFCA-D7F081F58CF4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*", matchCriteriaId: "B0AB8F07-AF43-4202-9908-F9A1DF6FFC03", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*", matchCriteriaId: "F8711A47-ABD5-40ED-847A-8D1663E3D819", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*", matchCriteriaId: "2958873B-A0AB-4EAF-A5CF-8423739FAB07", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*", matchCriteriaId: "1938D118-C07F-4BEC-8030-947F099BFCB8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", matchCriteriaId: "9D4D8C72-E7BB-40BF-9AE5-622794D63E09", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "65B65738-134F-4C1A-916B-D6CD6365CB43", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*", matchCriteriaId: "D5331586-8380-4F77-8735-17EC0D0E503A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*", matchCriteriaId: "93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*", matchCriteriaId: "AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*", matchCriteriaId: "35536E91-A58D-40F7-A256-34128E64B920", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "0F69329B-4D37-428E-B467-E3B9314A4D61", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "9615B275-5748-46CC-8A77-4A9550A39050", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "421CD923-6282-4404-A642-C04E1F57F12F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "AD4411CB-5EE9-455C-AE90-1770320EFD86", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "593D1680-4883-43FE-A925-B87ED1D2E785", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*", matchCriteriaId: "FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*", matchCriteriaId: "EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*", matchCriteriaId: "90769378-BBD1-48D0-921C-A79413B99CE6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*", matchCriteriaId: "6C6DF704-8CC8-42C3-83F1-4D38734DEAEF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "E636DC68-59FE-4BA0-BCFC-4DA97EE17B23", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*", matchCriteriaId: "7E0D6801-E9A8-416B-830B-7682A9AF65BC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*", matchCriteriaId: "E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*", matchCriteriaId: "23265E4D-855C-4CCC-A875-DFCBA55B3CB5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*", matchCriteriaId: "2EB86291-EB40-4CFD-A424-898EFB3D518B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*", matchCriteriaId: "A10AADAC-4687-4308-8E4F-B7F9549556DF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "1A747987-5218-4C1E-87C4-0675CD4F7A2E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*", matchCriteriaId: "7B6483CB-7838-45F7-AE28-824AD71172A6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*", matchCriteriaId: "04759B1E-8B40-460F-B33F-4E6332CFC31D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*", matchCriteriaId: "08AF3694-9686-444B-8D92-E41D262F74E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "C5595E7D-3CFD-4FF2-A6BE-59645058C54F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*", matchCriteriaId: "F4235428-5E2E-4BCB-98B7-8844B19C7AA1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*", matchCriteriaId: "9A1E17AB-F645-4636-9337-3158556E85A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*", matchCriteriaId: "86150D11-94D7-43F9-9D19-33778558255F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*", matchCriteriaId: "EDC43701-8A3A-42FB-B4F5-566DE59E542E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*", matchCriteriaId: "4EB2B390-A39F-4082-BBCB-712BDD95886D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*", matchCriteriaId: "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*", matchCriteriaId: "C7414D32-88A1-416E-A717-3F47B6D1BE74", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*", matchCriteriaId: "370DC543-AC01-4B91-88C7-60C323E35929", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*", matchCriteriaId: "BEAD7398-D1B2-47FB-952D-8C3162D5A363", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*", matchCriteriaId: "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*", matchCriteriaId: "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*", matchCriteriaId: "544BD924-2CBD-4130-BBD3-5AD084C85FE5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*", matchCriteriaId: "6B78181E-E1D1-4C25-85DE-CA46BBF21765", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*", matchCriteriaId: "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*", matchCriteriaId: "7D1CD80F-E898-41CE-8A86-28C2F48B928A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*", matchCriteriaId: "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*", matchCriteriaId: "BF610051-1638-4C1B-9864-11E34EFC4DE6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*", matchCriteriaId: "78260223-50C0-48F8-9A65-AE67489E602C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*", matchCriteriaId: "18E39462-4CEE-4C29-8B60-50E05FCF3E91", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*", matchCriteriaId: "3FF16123-CCA0-4ECD-9B8C-AC1534C3F244", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*", matchCriteriaId: "CC7454AF-7610-4CD3-BD2B-95A6C3283811", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*", matchCriteriaId: "AB633E6C-025C-4B31-ABE7-8318C813376B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*", matchCriteriaId: "DFED1FFB-899D-4A48-9CCA-0B8737AE1408", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*", matchCriteriaId: "883FA166-2973-42BA-842D-28FBDBFEAC4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*", matchCriteriaId: "4362045B-7065-4FF9-A977-B3DA7894F831", vulnerable: true, }, { criteria: "cpe:2.3:o:dragonflybsd:dragonflybsd:-:*:*:*:*:*:*:*", matchCriteriaId: "A17AD004-E2E0-4AC1-87E8-69B9C4AEBC9C", vulnerable: true, }, { criteria: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*", matchCriteriaId: "FFBE8937-E1BD-4601-AF1C-6DD20BB132AF", vulnerable: true, }, { criteria: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*", matchCriteriaId: "D676C769-17D1-48B2-98F4-AC3BDF2C882B", vulnerable: true, }, { criteria: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*", matchCriteriaId: "DEBD3CB7-D88A-4868-A6AD-0717A8A989EE", vulnerable: true, }, { criteria: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*", matchCriteriaId: "C79071BA-D3FB-4FDF-96A1-477BA88C3E6E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*", matchCriteriaId: "3B2AEFCC-A2F6-45A6-A2EF-24F7906E44E2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:0.4_1:*:*:*:*:*:*:*", matchCriteriaId: "3A37C19D-B29E-44B3-8DEF-FA32D0B01F8A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*", matchCriteriaId: "44EFD22E-02C9-4B80-8934-A9AC8DD858CF", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*", matchCriteriaId: "B1B4D4A5-25EB-48FE-BDFD-A274CE802648", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*", matchCriteriaId: "C11DD743-A21D-48F4-BD55-A8A4FA960F94", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "C496B665-70DA-4B98-A5D1-E2935C0CE840", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*", matchCriteriaId: "F3A037F1-98AD-47CC-8D83-B42666E1B61E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:1.5:*:*:*:*:*:*:*", matchCriteriaId: "973B0545-D595-4A82-A147-0AB28FE32E13", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", matchCriteriaId: "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "63236405-1F33-43DD-ACF7-B6D9656E0987", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "34797660-41F5-4358-B70F-2A40DE48F182", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*", matchCriteriaId: "6B3A2EBB-0359-49A7-B7F9-56EE6FD85D29", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "27C9E23D-AB82-4AE1-873E-C5493BB96AA1", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*", matchCriteriaId: "4054D69F-596F-4EB4-BE9A-E2478343F55A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*", matchCriteriaId: "CA26ABBE-9973-45FA-9E9B-82170B751219", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "7891202C-62AF-4590-9E5F-3514FDA2B38E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*", matchCriteriaId: "CF4F7002-A525-4A66-BE8B-E50ABBF144B2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BF8F9B2F-E898-4F87-A245-32A41748587B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", matchCriteriaId: "183667CA-6DF1-4BFB-AE32-9ABF55B7283A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "F1156954-25AD-45BE-AE49-9705ECD5BDA2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "EBDDEC3F-52EB-4E1E-84C4-B472600059EC", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B58E02AE-38B4-466E-BF73-2F0B80AF7BA5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "3928D5CF-6FC0-434C-8A80-ABDBF346C2C9", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "314BA420-4C74-4060-8ACE-D7A7C041CF2B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "2EAD7613-A5B3-4621-B981-290C7C6B8BA0", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "8ED84E66-CFD9-4DF8-9679-13457D340D54", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "D1CA3337-9BEE-49C5-9EDE-8CDBE5580537", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*", matchCriteriaId: "EE38C50A-81FE-412E-9717-3672FAE6A6F4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*", matchCriteriaId: "263F3734-7076-4EA8-B4C0-F37CFC4E979E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*", matchCriteriaId: "0419DD66-FF66-48BC-AD3B-F6AFD0551E36", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*", matchCriteriaId: "C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*", matchCriteriaId: "B982342C-1981-4C55-8044-AFE4D87623DF", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*", matchCriteriaId: "47E02BE6-4800-4940-B269-385B66AC5077", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*", matchCriteriaId: "7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "D0A585A1-FF82-418F-90F8-072458DB7816", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", matchCriteriaId: "AE31DFF8-06AB-489D-A0C5-509C090283B5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", matchCriteriaId: "DF49BF03-C25E-4737-84D5-892895C86C58", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:-:*:*:*:*:*:*", matchCriteriaId: "200000B9-E825-4986-B38F-5D45D34603F1", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:-:*:*:*:*:*:*", matchCriteriaId: "682CCB34-E6CD-42C5-A7A1-D5645BFAA189", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:-:*:*:*:*:*:*", matchCriteriaId: "D830933B-BD2B-482A-982C-088AF2F3A953", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:-:*:*:*:*:*:*", matchCriteriaId: "50CFCF96-C2E7-4039-AD7C-06DC79FA2C99", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.1:p1:*:*:*:*:*:*", matchCriteriaId: "F3EE7C5E-3B50-474B-A63B-1649CB798109", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.1:p10:*:*:*:*:*:*", matchCriteriaId: "465C3783-F2CD-4BD2-9DBC-161B4683EA37", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.1:p4:*:*:*:*:*:*", matchCriteriaId: "08E04379-047A-4E0D-B74F-73B5C582EE26", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.1:p5:*:*:*:*:*:*", matchCriteriaId: "B8950112-B547-494B-BAC1-0B81F165034C", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.1:p7:*:*:*:*:*:*", matchCriteriaId: "FD67FB47-726D-41A6-9D80-07848996FCB4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", matchCriteriaId: "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", matchCriteriaId: "B86C77AB-B8FF-4376-9B4E-C88417396F3D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:-:*:*:*:*:*:*", matchCriteriaId: "5364B2C0-677F-4F24-A9CD-D194CCC5C185", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:p2:*:*:*:*:*:*", matchCriteriaId: "E4470322-D617-4901-A062-C5E7DF124ABF", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:p6:*:*:*:*:*:*", matchCriteriaId: "30609E89-EA47-415F-BFF3-CC7065F0EA9E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:p7:*:*:*:*:*:*", matchCriteriaId: "48403EA5-779A-47F3-9341-A9516F06E0F4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", matchCriteriaId: "9FFD9D1C-A459-47AD-BC62-15631417A32F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*", matchCriteriaId: "582B9BF3-5BF1-44A3-A580-62F2D44FDD34", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", matchCriteriaId: "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*", matchCriteriaId: "BAD73CDB-94C5-4DBF-8B4C-DD3E4E399445", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", matchCriteriaId: "D8A80E6A-6502-4A33-83BA-7DCC606D79AA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*", matchCriteriaId: "AD85B1ED-1473-4C22-9E1E-53F07CF517E9", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*", matchCriteriaId: "7752D43D-64AF-474F-BFBB-2625A29C1B88", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*", matchCriteriaId: "1D2C79D5-D27F-4B08-A8DF-3E3AAF4E16A5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*", matchCriteriaId: "F4416CBA-76B9-4051-B015-F1BE89517309", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*", matchCriteriaId: "9118B602-3FB6-4701-AC09-763DD48334BA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*", matchCriteriaId: "F702C46F-CA02-4FA2-B7D6-C61C2C095679", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*", matchCriteriaId: "47E0A416-733A-4616-AE08-150D67FCEA70", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*", matchCriteriaId: "803EFA9F-B7CB-4511-B1C1-381170CA9A23", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "CCE246DE-641C-44A3-9FCC-5131655DBC1A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "DD1C3260-28D8-47C8-AB61-E2EA4ED2B1C1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", matchCriteriaId: "96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "6909B816-6778-48A8-A828-CA0AC5484388", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "B988FF88-E782-4581-9E24-CDE7E1734258", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "3F9C11B5-5D63-4D2B-AD9A-5E657A8E1D01", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "F24BEDA8-2D1D-4AA1-8806-02838FB4C323", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "7DAAF0A4-F1B1-4597-B9C1-E7F277061BD4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*", matchCriteriaId: "AE95DD29-6E5F-475B-BCB3-6F756C62FA16", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*", matchCriteriaId: "19A5A944-8CFC-40ED-96D1-842ECA7316B6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*", matchCriteriaId: "F5BF38E2-7353-4A55-ABA3-84085BB5F8CA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*", matchCriteriaId: "8C5C94F0-2390-4AF3-BE18-D00B10A67052", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*", matchCriteriaId: "E18C6032-012A-4B09-8D16-680CA3080D06", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*", matchCriteriaId: "134ED367-9610-485D-8935-3C46BFC073AB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*", matchCriteriaId: "C150050C-6C08-4434-848D-EB71741DF29E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*", matchCriteriaId: "08D41FAC-B0CD-48DE-AA43-27487FF9E424", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*", matchCriteriaId: "BC9CC013-D4FB-4EC0-B405-6B79DF7C2F65", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*", matchCriteriaId: "235B7E7D-3785-408A-AE53-7EB4F88F06C1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*", matchCriteriaId: "69A12556-5E7D-4832-A71A-66E6E9C2A710", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*", matchCriteriaId: "DA9B296A-126A-42E3-B3DD-158F895A48EB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*", matchCriteriaId: "ACC75E5B-48A5-4C28-88B2-870C62DDA337", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*", matchCriteriaId: "C3D2EFF1-78E4-4002-8904-9DA13D7D1DF7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*", matchCriteriaId: "73E02E89-832D-44D9-B2EE-1C070E99AE9A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*", matchCriteriaId: "3B55CD0D-0117-48F3-8643-4C191716AE20", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*", matchCriteriaId: "62BA4C24-FD29-421C-8F01-1798764C53F0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*", matchCriteriaId: "726B962B-D8B6-419E-BC0D-3DD9821234F6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*", matchCriteriaId: "985C2754-56B1-4638-B51E-313F7B8BA65F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*", matchCriteriaId: "746D0402-66BD-4225-B847-6762BC4DC18E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*", matchCriteriaId: "E657F58A-440D-40CB-97BF-ACB72AB36A3E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*", matchCriteriaId: "CF5E6A99-20FD-456C-A5E2-FEBA5DD672ED", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*", matchCriteriaId: "7699FD2E-C211-4E7E-BCA5-B991FBA90EDC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*", matchCriteriaId: "F93B921F-B152-49F3-9AAD-9421F5867F49", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*", matchCriteriaId: "46381F67-EC99-4EA7-9599-BD4A25827E9C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*", matchCriteriaId: "29AC849E-7D4E-4C00-8BD0-672F413A80B5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*", matchCriteriaId: "6996F1F1-5374-4BD2-B421-ABB15C7C0B49", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*", matchCriteriaId: "87E18AFD-5090-4C1F-A2EE-A32A28DB5182", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*", matchCriteriaId: "FC91B71A-2456-4410-9633-CF5870027D96", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*", matchCriteriaId: "92555500-16EB-4F76-B2C7-61A00A1AC722", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*", matchCriteriaId: "B03D22C9-94C6-4AC5-AAD0-15F06BCC5CA7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*", matchCriteriaId: "541B4ED8-E970-4C67-B5AF-7DE5B7F754D1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*", matchCriteriaId: "1E55F8A8-1ABD-4760-9074-353BBAEE005B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*", matchCriteriaId: "F873503F-C6E2-4AC2-859E-9431FE0FA0A3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*", matchCriteriaId: "39E849AC-B85A-4C4F-878B-E95A5F661E1E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*", matchCriteriaId: "5E4A2912-12AC-4DF1-8023-A0B7DBE9A866", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*", matchCriteriaId: "15004105-9A55-4592-96D6-3FF539EC7513", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.1.132:*:*:*:*:*:*:*", matchCriteriaId: "6E07DB8F-0BCF-4378-9BB5-CC948E09D37D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "146F7A77-A950-4CAD-BDA9-C239696F569D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "AD7A6B55-2F3B-422E-B1F2-80B482FE89AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "70DCE8FF-40C3-44F7-8185-0422ADDA051B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "7DAC3A7C-2092-46D4-908B-CF03F4217112", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "956B7F2F-DE46-492F-ACA3-BD5EE7EA14F3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "DE77B8D6-EF2A-4EC2-AF75-B6FA48747781", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "AAEC8651-9291-4CAE-AA49-C1CA4C7AE450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "5A6F3945-21ED-44C6-86D2-B7755A87014E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "C4919EB3-625C-4D83-8DCB-72BCF05DF2C6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", matchCriteriaId: "A5DDB008-E88E-473C-B030-AF9B6F5E4E48", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", matchCriteriaId: "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", matchCriteriaId: "0E48C9A9-B7E6-4314-BCEF-8013BBB4276E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", matchCriteriaId: "0EEF4480-D50B-464C-AE39-A12455DBC99F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", matchCriteriaId: "6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", matchCriteriaId: "15928E10-7D41-45B2-87D6-8AA10190A8EB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", matchCriteriaId: "C18E13C4-F42D-4168-B25E-544E1549C46B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", matchCriteriaId: "F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", matchCriteriaId: "C4947CDE-CB89-456B-8B5F-0E17B46BC893", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", matchCriteriaId: "6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", matchCriteriaId: "BF701E58-35E8-4DDE-B832-C5A23E61A3CA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", matchCriteriaId: "3C122CC4-B8CB-4AB9-8571-6F3D302F56A7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", matchCriteriaId: "2498D898-D243-4D0C-9AEF-0138D19A68B9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", matchCriteriaId: "3924060B-1EC1-4003-B306-E327634E7797", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", matchCriteriaId: "D45B43DF-FD4C-4C37-9569-1CCE450B8987", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", matchCriteriaId: "99879B2B-7FFB-4181-8928-13B7E17F36C6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*", matchCriteriaId: "83A3E250-5BC6-4AD3-A3DE-7F876FD90BE5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.26:*:*:*:*:*:*:*", matchCriteriaId: "B6126B84-9D78-48AF-B5A3-B89F9B1D42DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*", matchCriteriaId: "43F9DBB0-8AF7-42CA-95DD-68A344E9D549", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*", matchCriteriaId: "BC74D465-3256-4D87-8F47-C4D7CEA6E2D4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.1:*:*:*:*:*:*:*", matchCriteriaId: "24A58614-0522-48B1-9DF2-20001A37A936", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*", matchCriteriaId: "C37E17F7-A276-4A33-B454-751BF639EF9C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.3:*:*:*:*:*:*:*", matchCriteriaId: "97FBF069-C751-4F18-806A-DF8C809AE464", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.4:*:*:*:*:*:*:*", matchCriteriaId: "66F7DACF-2AAB-4D9E-8F62-F2B10B39974D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.5:*:*:*:*:*:*:*", matchCriteriaId: "4DE1FA10-5512-4147-8E5F-EAAAFE334B31", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.6:*:*:*:*:*:*:*", matchCriteriaId: "94433CD6-B625-494C-A85A-330D0774D198", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.7:*:*:*:*:*:*:*", matchCriteriaId: "1565B9E4-02DF-4725-9D31-189B4D3D840D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.8:*:*:*:*:*:*:*", matchCriteriaId: "1303C9DC-CD79-40B8-AF0B-8F90FA942106", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.9:*:*:*:*:*:*:*", matchCriteriaId: "00530A0F-E726-4F52-BF0E-CE7203AE3A81", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.10:*:*:*:*:*:*:*", matchCriteriaId: "329B6CD3-7B84-4718-9436-5F8A1AAA60ED", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.11:*:*:*:*:*:*:*", matchCriteriaId: "FB796B30-701B-4D5A-BF4B-C5CD81A48417", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.12:*:*:*:*:*:*:*", matchCriteriaId: "EB8FF20C-82B0-42D7-92AB-B4C45651B955", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.13:*:*:*:*:*:*:*", matchCriteriaId: "E97F35A6-11F9-43D3-AD53-23351865F7C3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.14:*:*:*:*:*:*:*", matchCriteriaId: "C10A1DB7-A847-43FA-92E6-4B2941DBECAA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.15:*:*:*:*:*:*:*", matchCriteriaId: "0FEEF97A-83E8-4CEE-8913-2D25E0E8AF6C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.16:*:*:*:*:*:*:*", matchCriteriaId: "CE443A39-5E8B-4303-9BE9-C3D934F06A8D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.17:*:*:*:*:*:*:*", matchCriteriaId: "A7258601-9481-4B43-A63D-825DB39ED51A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.18:*:*:*:*:*:*:*", matchCriteriaId: "24F31744-8A55-48A6-B934-18EBD9657FFA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.19:*:*:*:*:*:*:*", matchCriteriaId: "8C9FD388-E804-41D1-B051-588C03ED83D2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*", matchCriteriaId: "D6ECC079-EBD4-4E01-9CAC-A4FC84F79656", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*", matchCriteriaId: "249C1EEB-F267-44F2-B4D9-AEFA9E578FDD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*", matchCriteriaId: "E575B550-E957-4F68-A9FA-3EF4022028A9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*", matchCriteriaId: "256328E7-3F4E-49A3-9F66-6DAC1F7BE941", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*", matchCriteriaId: "D3E3CFEB-CF89-4697-9D3C-C1D41F5B803B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*", matchCriteriaId: "38F7C571-2713-402F-82CD-66B5C8A50319", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*", matchCriteriaId: "D582D69B-65A9-4906-9FF3-1EC7AD2AF927", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*", matchCriteriaId: "5D4E4BAD-E286-4F24-A786-B3DC281537B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*", matchCriteriaId: "293E5303-3BC2-4A01-99EE-F519E17F2CF9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*", matchCriteriaId: "73D6DAAF-6D2C-4D33-9109-BC112170762F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.30:*:*:*:*:*:*:*", matchCriteriaId: "7337DB6A-72E4-4F7C-8AA5-8EC546B632AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.31:*:*:*:*:*:*:*", matchCriteriaId: "6C655702-571C-481B-807C-9FE390B52159", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.32:*:*:*:*:*:*:*", matchCriteriaId: "48C775C8-DB4A-4D58-B573-2A8D612E26ED", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.33:*:*:*:*:*:*:*", matchCriteriaId: "61787316-0408-477D-937E-14596C215EFA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.34:*:*:*:*:*:*:*", matchCriteriaId: "EC9628D9-86C8-4200-B605-1D00C7DF9257", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.35:*:*:*:*:*:*:*", matchCriteriaId: "96BBA71E-5517-400E-A82E-ECE165C78583", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.36:*:*:*:*:*:*:*", matchCriteriaId: "C70A57A6-6633-459A-8AB5-DC009D407108", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.37:*:*:*:*:*:*:*", matchCriteriaId: "D2FCF983-1BD5-423D-A3A3-EAAA28BA4146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.38:*:*:*:*:*:*:*", matchCriteriaId: "04BF2B3C-7267-4C58-9CD8-270C27B5142F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.39:*:*:*:*:*:*:*", matchCriteriaId: "9152FDC9-A97F-455C-83EB-5070C7B32AE6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.40:*:*:*:*:*:*:*", matchCriteriaId: "340F5E67-8F70-4374-BF9A-0AA425A4A5A7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.41:*:*:*:*:*:*:*", matchCriteriaId: "430E39C3-0E40-42C6-9839-982610D97EEF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.42:*:*:*:*:*:*:*", matchCriteriaId: "C0F96C09-D870-4DE7-A8D1-803D7071126D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.43:*:*:*:*:*:*:*", matchCriteriaId: "CEED38F2-9FC3-44E5-A4A9-D5573C6CAE06", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.44:*:*:*:*:*:*:*", matchCriteriaId: "1DAA6363-569D-4234-B784-A357C59C2ED7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.45:*:*:*:*:*:*:*", matchCriteriaId: "7463B1BB-551E-4D0D-8FB0-6BE2D61DFA6C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.46:*:*:*:*:*:*:*", matchCriteriaId: "B72CB2A8-18C3-4890-B03A-3FCD8638F857", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.47:*:*:*:*:*:*:*", matchCriteriaId: "B0B60B7E-619E-4844-BBAB-AB8F9D8CF430", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.48:*:*:*:*:*:*:*", matchCriteriaId: "40D99B33-99AC-4AD9-A599-270CC82744D0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.49:*:*:*:*:*:*:*", matchCriteriaId: "3983BAF0-C2E1-440B-9A03-880DE197CAAC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.50:*:*:*:*:*:*:*", matchCriteriaId: "2CAAF6CF-148D-4328-9C08-5A18CEF6B71F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.51:*:*:*:*:*:*:*", matchCriteriaId: "A0EF7B9C-46AF-4AD3-B940-9C631ED7A704", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*", matchCriteriaId: "4817429F-B24F-47E3-BB3B-7EF9036D5F93", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", matchCriteriaId: "361D407D-A4BE-491D-BC8E-32E78DC4A8F0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*", matchCriteriaId: "A3CD7983-4EB2-4D17-9332-493ECBADC284", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*", matchCriteriaId: "550DFE6E-DCE6-4649-8746-522996021DBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*", matchCriteriaId: "E17BB496-749A-40C8-BAA9-6CFBBE308065", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*", matchCriteriaId: "0C30F255-1297-46EA-9FBC-05564792FF65", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*", matchCriteriaId: "934CBC22-864C-468F-B267-3CDE4449DA9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*", matchCriteriaId: "2AC432E3-7214-4B61-A666-2DAF5CCAEC52", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*", matchCriteriaId: "7682650A-8332-484D-874F-2B67246880B0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*", matchCriteriaId: "6DFF499A-6602-4BD3-90B5-E6C4AC888812", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*", matchCriteriaId: "0C406D55-D6CF-443B-B5DB-FC69FBEA01D0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*", matchCriteriaId: "1C53EDB2-923D-4860-8251-9A07C9F8FDB2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*", matchCriteriaId: "2E2A5D6B-7011-40AE-8A94-02B062B19010", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*", matchCriteriaId: "9E460A86-FD22-4023-A0D7-0D2F43131635", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*", matchCriteriaId: "CFFCA2ED-2384-4DB7-9634-AEAEDFF57817", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "D6F04081-D672-488E-A91D-5088DD04AA5A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "9BDB59EF-74EF-462E-BC84-89201F734380", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "0755A136-3DE3-4B61-B5EF-F6282AACD38E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*", matchCriteriaId: "B1531AD3-2525-4F6E-B77D-FE8863CBD3EB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*", matchCriteriaId: "81D950C3-0DDC-4549-99F8-1E206768219A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*", matchCriteriaId: "5C7E2A5B-6CF3-4748-BE4F-F63A4E59CB64", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*", matchCriteriaId: "195A133A-26C9-401E-913F-285BA220D1D2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*", matchCriteriaId: "B8D68E21-6C58-46A7-96F2-9A79DD880803", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*", matchCriteriaId: "1E975B63-3D9C-4FA9-A6D0-C9865FDA7AC5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*", matchCriteriaId: "38D11B12-AFD7-4055-A366-D932CA1BA8C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*", matchCriteriaId: "BC990132-9DF2-4D23-B9DA-0819809A3CAC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*", matchCriteriaId: "FFA51D40-E72C-40A4-B238-70F6806FA1B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*", matchCriteriaId: "1E1B7D68-E41E-4A5A-9606-F14F057B39E5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*", matchCriteriaId: "7799A9CE-1948-4D71-BADB-A4A7ECAFF5FF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*", matchCriteriaId: "70BCB10C-FD72-4F18-84C9-AE0603402426", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*", matchCriteriaId: "54A74CAB-2BD1-48BC-BCEB-983E72B3C56D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*", matchCriteriaId: "CF742FF1-5504-41BB-8FAA-D71B83C791B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*", matchCriteriaId: "901C6D04-3226-4654-9A41-0325B48A2F7F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*", matchCriteriaId: "072A77AD-BB27-4C24-91A0-A12D6E741593", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*", matchCriteriaId: "BF900D1D-E351-4407-8269-80E5403432B5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*", matchCriteriaId: "44915F9F-88DF-4304-8F66-58A869654BDA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*", matchCriteriaId: "4CC2D90D-2115-406C-B609-870B241F00B6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*", matchCriteriaId: "EF681CC1-B3EC-467A-A10D-10840D3D4575", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*", matchCriteriaId: "8660C030-328E-4221-847E-AC4BDA08CE79", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*", matchCriteriaId: "0EE83E4E-DBA6-47EB-80FF-9A41A2978DDE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*", matchCriteriaId: "B58DE3A3-2BE0-45E3-8EFD-5A4439EAD6DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*", matchCriteriaId: "47AEC277-F9A4-412F-B2EA-C1AEA336A46C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*", matchCriteriaId: "7234AF29-BCDA-4728-A141-C169EE59CEC6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*", matchCriteriaId: "E7D9064F-466F-4D66-AD5E-8BC2D31CD80D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*", matchCriteriaId: "374851C5-C61D-4964-8B4A-473B0A008F11", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*", matchCriteriaId: "1FD55C81-3687-46BF-880E-58D7E005A185", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*", matchCriteriaId: "2953267F-16BF-404F-83F1-73E0908979B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*", matchCriteriaId: "9D953B61-3457-4A0E-A668-BA4937B79784", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*", matchCriteriaId: "5F5F3607-C0DD-494C-AB6E-46E383A6B17D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*", matchCriteriaId: "19138F52-25EA-42B6-89DC-692A8AF0A720", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*", matchCriteriaId: "4C2EBADC-0817-4E38-9F49-8446D8A20CDE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*", matchCriteriaId: "340368E7-0005-4F8A-8AF1-C20A1198288C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*", matchCriteriaId: "0DC860DD-57DF-4474-AE2B-9AADB9060175", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*", matchCriteriaId: "DC1D576A-0763-4611-B3CF-CD8514F18783", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*", matchCriteriaId: "4A61F3C5-EA3A-4AA2-8F4E-02E07864801F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*", matchCriteriaId: "6F570226-CA89-46F4-8C68-9A59BC0602A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*", matchCriteriaId: "162A88DA-E2EA-4E92-B174-9AD86BE8D983", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*", matchCriteriaId: "EBE19B6B-9537-4C76-80B2-98DAF2C15B5F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*", matchCriteriaId: "5EE5C4F5-C64D-4714-B02E-689B435E3E5E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*", matchCriteriaId: "BE4F20D3-77E7-4FC2-AF18-6A5E3AE08615", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*", matchCriteriaId: "164F4483-9F28-491A-8F99-4242C9B9CBD3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*", matchCriteriaId: "34803A7D-45C4-4DBE-BF18-19CE9DE62A96", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*", matchCriteriaId: "1178D6EE-A462-4CC1-B430-9A44C75D2336", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*", matchCriteriaId: "4360530E-6E07-48F9-B8F8-B36622331052", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*", matchCriteriaId: "17508D09-AE14-4458-93A2-E2764452EA8D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*", matchCriteriaId: "05F2CD4A-CCA9-4743-86C4-7675D2487E16", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*", matchCriteriaId: "75C1504C-03C5-49E4-8192-E1E698CF07A1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*", matchCriteriaId: "DB7CB4B0-1CF5-4AA7-A977-9C24AD6C486D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*", matchCriteriaId: "37A3172A-E663-42F6-90E7-51C3850AF9E0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*", matchCriteriaId: "16F6692C-494F-44ED-97C6-A6CD05334DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*", matchCriteriaId: "3B61C93E-84FE-46CE-A7DD-ACFEFB96BB62", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*", matchCriteriaId: "5E79FB38-5AE5-4ACD-B4F5-F533C0E1D503", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*", matchCriteriaId: "77231F8B-137F-4FAE-BCD9-658F32943CBF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*", matchCriteriaId: "552ED77A-F09A-4923-A907-8E0DF8445363", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*", matchCriteriaId: "CDD8EDD0-7817-4A5E-AE97-DA1941E859BB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*", matchCriteriaId: "5DF940EA-676A-42C8-A6E0-7F53C8A34340", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*", matchCriteriaId: "BDC8FDE8-DB5A-4B2D-810D-73E91194E00E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*", matchCriteriaId: "5CF7304E-AAA9-4BC3-AEF0-C9509E95ECA9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*", matchCriteriaId: "29DCCFB1-054F-4BF0-92F1-78A2063415D7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*", matchCriteriaId: "D3D3222C-7469-42F6-984D-3223BCD8080E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*", matchCriteriaId: "697B7069-D08D-41BD-8285-A1ABA0E1142F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*", matchCriteriaId: "72173CFB-BAB6-456C-B5F2-3AA31D799E74", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*", matchCriteriaId: "FDD08A67-195F-431B-98A5-42B2966055DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*", matchCriteriaId: "658C7317-D50B-475A-9E0E-E68AECD49B5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*", matchCriteriaId: "1270F454-8E05-413C-BAF4-35D062CA5803", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", matchCriteriaId: "455E647F-73DD-400A-AA19-3D93FE2E57AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*", matchCriteriaId: "ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*", matchCriteriaId: "B812DFE2-6FFA-4D31-839C-0CCB2B1310EF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", matchCriteriaId: "2CDE1E92-C64D-4A3B-95A2-384BD772B28B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", matchCriteriaId: "9D90502F-EC45-4ADC-9428-B94346DA660B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", matchCriteriaId: "1CD39A7A-9172-4B85-B8FE-CEB94207A897", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", matchCriteriaId: "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", matchCriteriaId: "81DE32C2-5B07-4812-9F88-000F5FB000C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", matchCriteriaId: "02EED3D5-8F89-4B7F-A34B-52274B1A754F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", matchCriteriaId: "5F87AA89-F377-4BEB-B69F-809F5DA6176C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", matchCriteriaId: "C27AF62E-A026-43E9-89E6-CD807CE9DF51", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", matchCriteriaId: "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", matchCriteriaId: "D343B121-C007-49F8-9DE8-AA05CE58FF0B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", matchCriteriaId: "7936B7EE-9CD1-4698-AD67-C619D0171A88", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", matchCriteriaId: "A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", matchCriteriaId: "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", matchCriteriaId: "5738D628-0B2D-4F56-9427-2009BFCB6C11", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", matchCriteriaId: "F43EBCB4-FCF4-479A-A44D-D913F7F09C77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", matchCriteriaId: "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", matchCriteriaId: "860F9225-8A3F-492C-B72B-5EFFB322802C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", matchCriteriaId: "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", matchCriteriaId: "57E23724-2CA4-4211-BB83-38661BE7E6AF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", matchCriteriaId: "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", matchCriteriaId: "3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*", matchCriteriaId: "8D7BBB5F-44F7-467F-B934-33ABF744A107", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*", matchCriteriaId: "0478831E-87B2-441F-AEC2-403A35FED1D8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", matchCriteriaId: "6143DC1F-D62E-4DB2-AF43-30A07413D68B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", matchCriteriaId: "298266AB-2A36-4606-BF80-2185FC56C4D2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", matchCriteriaId: "7C2658CA-56C2-494F-AC42-618EC413CBDF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", matchCriteriaId: "AD34526D-F2CC-44C5-991D-B1E41C327860", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", matchCriteriaId: "C2F0B900-34E9-4545-B7AE-AF0A4363EACE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", matchCriteriaId: "B36F432D-FED1-4B8D-A458-BEDEEF306AB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", matchCriteriaId: "5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", matchCriteriaId: "25379B32-D898-4E44-A740-978A129B5E05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", matchCriteriaId: "7B90F8F2-9549-413D-9676-3EF634D832B5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", matchCriteriaId: "915E64EF-6EEC-4DE2-A285-5F3FCE389645", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", matchCriteriaId: "585BEE46-088A-494E-8E18-03F33F6BBEA5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", matchCriteriaId: "EFF35478-B292-4A00-B985-CEEDE8B212C3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", matchCriteriaId: "6E85846A-61BE-4896-B4A6-42A7E1DBA515", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", matchCriteriaId: "D6E3B925-031D-4F6D-915A-A16F0FFA878C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", matchCriteriaId: "7344B707-6145-48BA-8BC9-9B140A260BCF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", matchCriteriaId: "9BFCEA98-C708-4E1E-B189-E6F96D28F07A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", matchCriteriaId: "2B753112-CCDE-4870-AA97-4AAA2946421A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", matchCriteriaId: "79B3AFE7-F4FF-4144-9046-E5926E305A03", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", matchCriteriaId: "7616E197-ACCA-4191-A513-FD48417C7F88", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", matchCriteriaId: "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", matchCriteriaId: "7EE2F94D-E8E0-4BB7-A910-378012580025", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", matchCriteriaId: "66F5AE3B-B701-4579-B44A-0F7A4267852E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*", matchCriteriaId: "1EBB1A21-3826-4BC5-A243-AF8F8D1D4728", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", matchCriteriaId: "34E60197-56C3-485C-9609-B1C4A0E0FCB2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", matchCriteriaId: "86E452E4-45A9-4469-BF69-F40B6598F0EA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", matchCriteriaId: "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", matchCriteriaId: "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", matchCriteriaId: "48777A01-8F36-4752-8F7A-1D1686C69A33", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", matchCriteriaId: "42DA6A18-5AA1-4920-94C6-8D0BB73C5352", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", matchCriteriaId: "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", matchCriteriaId: "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", matchCriteriaId: "4C4E1245-C6BB-462C-9E27-C608595DAE3C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", matchCriteriaId: "747F1324-AEFA-496F-9447-12CD13114F60", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", matchCriteriaId: "795C3B17-687E-4F33-AA99-8FEC16F14693", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", matchCriteriaId: "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", matchCriteriaId: "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", matchCriteriaId: "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", matchCriteriaId: "4BD589CC-666B-4FAA-BCF0-91C484BDDB09", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", matchCriteriaId: "4CD622EE-A840-42E1-B6BF-4AA27D039B12", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", matchCriteriaId: "900D6742-DE0F-45C5-A812-BF84088CB02A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", matchCriteriaId: "225CA94C-8C84-4FA6-95D0-160A0016FBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", matchCriteriaId: "D88ED3C4-64C5-44B2-9F23-E16087046C40", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", matchCriteriaId: "03FB31E5-190C-489A-AB30-910D2CC854F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", matchCriteriaId: "EF4A781A-4A41-466F-8426-10B40CF8BA1A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", matchCriteriaId: "9ED29B3F-456B-4767-8E59-8C19A3B7E1D8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", matchCriteriaId: "F6316369-B54A-4E59-A022-E0610353B284", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", matchCriteriaId: "073C3CE0-E12D-4545-8460-5A1514271D50", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*", matchCriteriaId: "670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*", matchCriteriaId: "AEB33DEA-13C7-4B36-AB8A-ED680679A071", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*", matchCriteriaId: "86DD0FCC-BB12-410D-8C82-AB99C7C5311E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*", matchCriteriaId: "83700989-8820-48DA-A9FE-6A77DF1E8439", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*", matchCriteriaId: "CC9F4CEC-7781-468B-B460-4F487B7C6601", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*", matchCriteriaId: "67C75A62-8807-4821-9362-1E0D63C0A1B4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*", matchCriteriaId: "894D4812-D62F-489E-8D0E-5E9468CE8EC9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*", matchCriteriaId: "C1F92E01-4F08-4364-9E87-FFBC095E32E7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*", matchCriteriaId: "F9960640-F02D-4E81-A34B-1893D8FD7F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*", matchCriteriaId: "D9D00DAD-4F2D-45C7-B87C-85118D9DD855", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*", matchCriteriaId: "0C398D26-7132-4A6E-9003-77246644451B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*", matchCriteriaId: "5EED2DA2-2516-42E9-8A33-0FA64BF51DB6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*", matchCriteriaId: "FF425F00-41BA-4F59-A0DE-6362A1E9A142", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*", matchCriteriaId: "33577E79-1B6E-406D-A49B-2CEF1754F5D1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*", matchCriteriaId: "8B21D90E-5172-485E-87AC-F1681604AD7F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*", matchCriteriaId: "C41F6822-92BF-43F5-8B3E-8BAF9E9A320D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*", matchCriteriaId: "641EECFD-A985-4026-A53A-10FBE47EAD91", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*", matchCriteriaId: "47595F81-2083-4236-A0B0-E2B98DD78402", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*", matchCriteriaId: "0CCA5C83-5293-4107-8E6A-85F82ECF2C80", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*", matchCriteriaId: "C2D0AADC-BC34-40FB-BD69-37981DC8E971", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*", matchCriteriaId: "3CA7EAC4-7696-41CE-8EE9-3E39DE226BD3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*", matchCriteriaId: "12547B6B-78F1-4426-81CE-5F208794658C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*", matchCriteriaId: "38429E64-276B-46D4-AACD-05349D6F6615", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*", matchCriteriaId: "E89640F8-313B-4A36-A591-36645D1EF838", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*", matchCriteriaId: "CE0271F0-41F2-4096-8C91-DAD1A81AF855", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*", matchCriteriaId: "7A40DCBB-B41B-468E-A918-6EA3F9A125E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*", matchCriteriaId: "921B6A54-85E3-4867-8EDF-93EB86BAFBD9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*", matchCriteriaId: "C8A2C6F1-ED7E-4E51-BE72-BD744D554EE5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*", matchCriteriaId: "2B004CF1-0ACC-441C-9F61-9B20504F4ECC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", matchCriteriaId: "9E86E13B-EC92-47F3-94A9-DB515313011D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", matchCriteriaId: "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", matchCriteriaId: "6555D45B-D3B3-4455-AB1E-E513F9FB6139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", matchCriteriaId: "4FA5E262-7825-496F-AA72-0AD6DE6F3C78", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*", matchCriteriaId: "56C6C01B-4CED-4F37-A415-0603496C27DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*", matchCriteriaId: "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*", matchCriteriaId: "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*", matchCriteriaId: "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*", matchCriteriaId: "DC47887B-5608-47BE-85EE-563864461915", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*", matchCriteriaId: "AF39E62B-EAB4-44B0-A421-2A71B7DD8341", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*", matchCriteriaId: "809264F1-763D-4A8F-B206-222332DD8732", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*", matchCriteriaId: "A66ED53E-3139-4972-B027-D614BFFB8628", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*", matchCriteriaId: "85A3AB7A-1959-4A57-B83D-B2753C43649E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*", matchCriteriaId: "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*", matchCriteriaId: "4A60B265-5508-4EE0-980A-44BB0966FD7A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*", matchCriteriaId: "C06F0037-DE20-4B4A-977F-BFCFAB026517", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*", matchCriteriaId: "7A252C50-D63A-4FC0-A51E-A63A939D6AA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*", matchCriteriaId: "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*", matchCriteriaId: "338BB401-8831-4094-9186-2B3CFA5903D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*", matchCriteriaId: "1E32E6BA-AFEF-44A8-B230-87DD043BB222", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*", matchCriteriaId: "F69E575B-BD1A-4E50-8D6F-131D5E08058E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*", matchCriteriaId: "20F6269B-5F6B-4413-B14D-7AE5442E4CCD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*", matchCriteriaId: "189D1246-F975-4411-A58B-343ED90485FD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*", matchCriteriaId: "1B914F7F-C6BD-4527-B1E9-7FD1E337A18C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*", matchCriteriaId: "82EC9FCA-D17D-4CB9-B925-E8F8B68F8FCE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*", matchCriteriaId: "179147E4-5247-451D-9409-545D661BC158", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*", matchCriteriaId: "6554469E-F6AE-4EB0-880E-CBFD196FEE31", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*", matchCriteriaId: "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*", matchCriteriaId: "C20367B0-F722-4442-8B59-ABB0FEDB8CC8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*", matchCriteriaId: "86A98A70-51E3-4556-8DC4-DD09CF370D1A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*", matchCriteriaId: "C6940324-0383-4510-BA55-770E0A6B80B7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", matchCriteriaId: "1E3313D5-52E8-49B3-B145-170D9A26DA43", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*", matchCriteriaId: "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*", matchCriteriaId: "480F035A-A59D-4113-A246-DF108BB2F591", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*", matchCriteriaId: "30D39E29-B2A0-4075-84AF-994C27AB0A68", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*", matchCriteriaId: "19879317-B067-45DA-B497-21EBDDDC2521", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*", matchCriteriaId: "D220C745-28AD-4D04-B2D2-A090D229206E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*", matchCriteriaId: "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*", matchCriteriaId: "E4AF8895-7BF8-458E-B2BB-68699AABC023", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*", matchCriteriaId: "CA768A9D-6C63-405E-9D14-5D68F8E93A91", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*", matchCriteriaId: "FF495E58-DA6C-402D-B381-4929CB8A502B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*", matchCriteriaId: "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*", matchCriteriaId: "A591301C-C30F-44AC-90F0-709A18AA96E0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*", matchCriteriaId: "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*", matchCriteriaId: "610A93BB-70E3-4BF1-83E8-8A7388477F44", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*", matchCriteriaId: "821BD11F-3C6A-4424-BC9B-DFD786248B07", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*", matchCriteriaId: "50B422D1-6C6E-4359-A169-3EED78A1CF40", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*", matchCriteriaId: "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*", matchCriteriaId: "A2F19064-CFBF-4B3C-A0A1-CE62265CD592", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*", matchCriteriaId: "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*", matchCriteriaId: "AB759752-DC19-4750-838B-056063EFDC5F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*", matchCriteriaId: "615BDD1D-36AA-4976-909B-F0F66BF1090C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*", matchCriteriaId: "EE8A26D6-1BDA-45F0-8F7C-F95986050E32", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*", matchCriteriaId: "F320FA9F-C13D-4AA3-B838-A0E5D63E6A29", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*", matchCriteriaId: "B179CF1D-084D-4B21-956F-E55AC6BDE026", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*", matchCriteriaId: "6F1B4877-286A-44B5-9C5C-0403F75B2BAA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*", matchCriteriaId: "432CA976-6EFA-4D34-B5EA-CD772D067F93", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*", matchCriteriaId: "6E476195-657E-416E-BC16-44A18B06A133", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*", matchCriteriaId: "DFF566DA-0F04-48DA-AA40-565979C55328", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*", matchCriteriaId: "5C6A3A30-FEA4-40B6-98A9-1840BB4E8CBE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*", matchCriteriaId: "5140380C-71BD-464F-AE53-1814C2653056", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*", matchCriteriaId: "B18EC0A7-8616-4039-B98B-E1216E035B05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*", matchCriteriaId: "22FB141B-FA2A-435D-8937-83FC0669CB20", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*", matchCriteriaId: "C59131C8-F66A-4380-9F6E-3FC14C7C8562", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*", matchCriteriaId: "A5421616-4BF5-4269-8996-C3D2BA6AE2A1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*", matchCriteriaId: "23FC6CE2-8717-4558-A309-A441D322F00E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*", matchCriteriaId: "311BE336-7BB2-47C0-AED5-3DEA706C206F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*", matchCriteriaId: "5AAC2E9D-0E82-4866-9046-ADD448418198", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*", matchCriteriaId: "67F2047A-5F17-4B59-9075-41A5DC5C1CD1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*", matchCriteriaId: "9A12DE15-E192-4B90-ADB7-A886B3746DD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*", matchCriteriaId: "FF6588E7-F4FA-40F5-8945-FC7B6094376E", vulnerable: true, }, { criteria: "cpe:2.3:o:midnightbsd:midnightbsd:-:*:*:*:*:*:*:*", matchCriteriaId: "11F7D4E2-850E-4FAC-B447-608F1D41B686", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:-:*:*:*:*:*:*:*", matchCriteriaId: "F7751B50-9C8D-45E9-93C1-FD4B27A1427B", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", matchCriteriaId: "9DF613C9-DC4A-45F0-BEE1-8450762B0089", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", matchCriteriaId: "441CEF2E-9687-4930-8536-B8B83018BD28", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*", matchCriteriaId: "55DD3C82-0B7D-4B25-B603-AD6C6D59239A", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*", matchCriteriaId: "FC7A39CD-C4B2-4FD9-A450-E5C7A5480174", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", matchCriteriaId: "7CBA1B13-B378-4F13-BD13-EC58F15F5C81", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "B8C8CAB1-2D8C-4875-A795-41178D48410F", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", matchCriteriaId: "2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*", matchCriteriaId: "C422E343-ADF2-427D-865D-B5C35431EFD1", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*", matchCriteriaId: "1C288A88-11C6-429E-A109-0395D0989264", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "516C6D9A-7483-4E36-A2E0-42698161AD31", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*", matchCriteriaId: "B1F89124-E194-4C7A-B06D-8535B4066AA3", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", matchCriteriaId: "E10D9BF9-FCC7-4680-AD3A-95757FC005EA", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "78E8C3A4-9FA7-4F2A-8C65-D4404715E674", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", matchCriteriaId: "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", matchCriteriaId: "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", matchCriteriaId: "28A10F5A-067E-4DD8-B585-ABCD6F6B324E", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "249FA642-3732-4654-88CB-3F1D19A5860A", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*", matchCriteriaId: "5071CA39-65B3-4AFB-8898-21819E57A084", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", matchCriteriaId: "A3C3F588-98DA-4F6F-A083-2B9EE534C561", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "1C2ED81B-8DA2-46D0-AE24-C61BF8E78AE9", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "D18C95A3-15E3-41B8-AC28-ACEA57021E24", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "6CFC6B75-9057-4E58-A4D4-8AEC12AE62E4", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*", matchCriteriaId: "36419DD6-0DB4-4BB6-A35F-D8FDB89402F1", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*", matchCriteriaId: "28BD9F91-2384-4557-9648-25FC00D04677", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "3ECF9E5F-AF38-42B9-8B49-6C254394CDFB", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*", matchCriteriaId: "F9CABFAA-594C-45D7-A0C7-795872A0C68A", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "4F9432E9-AACA-4242-BDAB-8792ACF72C12", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "29C02C6B-AAFD-4594-94A4-F26BA3648CB0", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*", matchCriteriaId: "57C533D7-771E-4E33-A4FE-764C0B73F920", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:3.99.15:*:*:*:*:*:*:*", matchCriteriaId: "F7C5D200-B40F-458D-8216-A3C22B21B46A", vulnerable: true, }, { criteria: "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "9875E709-11BA-4B8F-A2FC-26844DD4D563", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*", matchCriteriaId: "41D2806B-D7B2-4982-B759-8D60866A36DB", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*", matchCriteriaId: "36DF0D51-FCFA-46A3-B834-E80DFA91DFDC", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*", matchCriteriaId: "5CB726CF-ADA2-4CDA-9786-1E84AC53740A", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*", matchCriteriaId: "1FC373FC-88AC-4B6D-A289-51881ACD57F7", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", matchCriteriaId: "1D2DA7F0-E3C0-447A-A2B0-ECC928389D84", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*", matchCriteriaId: "FEBE290B-5EC6-4BBA-B645-294C150E417A", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*", matchCriteriaId: "ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*", matchCriteriaId: "0DF053A1-C252-427E-9EEF-27240F422976", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*", matchCriteriaId: "48A9C344-45AA-47B9-B35A-1A62E220D9C6", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", matchCriteriaId: "80EB24F0-46A7-481B-83ED-8BB012AE0C8E", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*", matchCriteriaId: "AA6AEAF0-FA61-4A3F-A083-1218C2027781", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*", matchCriteriaId: "60DA30A1-3360-46BC-85B7-008D535F95BE", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", matchCriteriaId: "DA33E7E2-DE7B-411E-8991-718DA0988C51", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*", matchCriteriaId: "1957B3C0-7F25-469B-BC3F-7B09260837ED", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*", matchCriteriaId: "AC46909F-DDFC-448B-BCDF-1EB343F96630", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*", matchCriteriaId: "9496279F-AB43-4B53-81A6-87C651ABC4BA", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*", matchCriteriaId: "BDA160D4-5CAB-44E7-880A-59DD98FEAD62", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*", matchCriteriaId: "D4D84D7A-EB7C-4196-B8B6-7B703C8055C2", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*", matchCriteriaId: "AEAE2873-0028-4744-B64E-8E2EA30447F6", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*", matchCriteriaId: "783973F9-2A6E-4DDF-A64C-7794FFD0B7B9", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*", matchCriteriaId: "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "CC77812C-D84E-493E-9D21-1BA6C2129E70", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*", matchCriteriaId: "16C117F3-3684-4683-9F9E-CEDD5B88F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*", matchCriteriaId: "9DF8DD37-A337-4E9D-A34E-C2D561A24285", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*", matchCriteriaId: "F12313A0-1EAF-4652-9AB1-799171CFFEA9", vulnerable: true, }, { criteria: "cpe:2.3:o:trustedbsd:trustedbsd:-:*:*:*:*:*:*:*", matchCriteriaId: "30A1BB80-2569-4800-9668-ACE3978877B3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*", matchCriteriaId: "CA2CBE65-F4B6-49AF-983C-D3CF6C172CC5", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*", matchCriteriaId: "1D929AA2-EE0B-4AA1-805D-69BCCA11B77F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*", matchCriteriaId: "5494A20A-5927-4249-942C-189292E5F956", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", matchCriteriaId: "3A04E39A-623E-45CA-A5FC-25DAA0F275A3", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*", matchCriteriaId: "BF1AD1A1-EE20-4BCE-9EE6-84B27139811C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*", matchCriteriaId: "34DF3B5E-F17F-49B4-9DC8-06749F3C9CC3", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*", matchCriteriaId: "C9392D35-7BF5-48E9-879B-BBDE9A9E9AB9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_blade_switch_3020_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC1F6E8C-07CB-4612-9CEA-5BB1D4C691B4", versionEndExcluding: "12.2\\(50\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*", matchCriteriaId: "E4EBA036-A69E-40FE-B8A2-6D99C0AB9F35", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_blade_switch_3120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "52B522E0-47BC-4885-9C27-D9B5F603880B", versionEndExcluding: "12.2\\(50\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*", matchCriteriaId: "BEDE0913-7E59-4741-B0D9-EC6C90C5E21C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_blade_switch_3120x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CDD283F6-CB69-4939-80F5-9BBAD7B7823E", versionEndExcluding: "12.2\\(50\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*", matchCriteriaId: "808DEBC5-0249-491C-9607-9263F781BCDC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", matchCriteriaId: "722A52CF-4C6E-44D3-90C4-D2F72A40EF58", vulnerable: true, }, { criteria: "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", matchCriteriaId: "4F864AD7-53A2-4225-870F-062876CE45DD", vulnerable: true, }, { criteria: "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", matchCriteriaId: "964B57CD-CB8A-4520-B358-1C93EC5EF2DC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.", }, { lang: "es", value: "La implementación del protocolo TCP en (1) Linux, (2) plataformas basadas en BSD Unix, (3) Microsoft Windows, (4) productos Cisco, y probablemente otros sistemas operativos, permite a atacantes remotos provocar una denegación de servicio (agotamiento de cola de conexión) a través de múltiples vectores que manipulan información en la tabla de estados del TCP, como lo demuestra sockstress.", }, ], evaluatorComment: "Please see also:\nhttp://blog.robertlee.name/2008/10/more-detailed-response-to-gordons-post.html\n\nand\n\nhttp://www.curbrisk.com/security-blog/robert-e-lee-discusses-tcp-denial-service-vulnerability-sc-magazine.html\n\n\n\n\n\n\n\n\n\n", evaluatorImpact: "The impact of this vulnerability has yet to be determined. The full list of affected platforms is subject to change. The NVD will continue to monitor this vulnerability and adjust the configurations as needed.", id: "CVE-2008-4609", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2008-10-20T17:59:26.163", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://insecure.org/stf/tcp-dos-attack-explained.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.outpost24.com/news/news-2008-10-02.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA09-251A.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "The attacks reported by Outpost24 AB target the design limitations of the TCP protocol. Due to upstreams decision not to release updates, Red Hat do not plan to release updates to resolve these issues however, the effects of these attacks can be reduced via the mitigation methods as written in http://kbase.redhat.com/faq/docs/DOC-18730.", lastModified: "2009-09-08T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-16", }, { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.