5287 lines
1.7 MiB
5287 lines
1.7 MiB
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2008-4609</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: false,
|
||
cnaV3Present: false,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2008-4609</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.</p><br/>
|
||
|
||
|
||
|
||
<div id="VulnEvaluatorDiv"
|
||
data-testid="vuln-evaluator-description-container">
|
||
<h3>Evaluator Description</h3>
|
||
<p data-testid="vuln-evaluator-description">Please see also:
|
||
http://blog.robertlee.name/2008/10/more-detailed-response-to-gordons-post.html
|
||
|
||
and
|
||
|
||
http://www.curbrisk.com/security-blog/robert-e-lee-discusses-tcp-denial-service-vulnerability-sc-magazine.html
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</p>
|
||
</div>
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss3-panel-score-na">N/A</a></span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss3-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value=""/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2008-4609&vector=(AV:N/AC:M/Au:N/C:N/I:N/A:C)&version=2.0&source=NIST" class="label label-danger">7.1 HIGH</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:N/AC:M/Au:N/C:N/I:N/A:C)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>7.1 </span><span data-testid='vuln-cvssv2-base-score-severity'>HIGH</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:N/AC:M/Au:N/C:N/I:N/A:C)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>6.9</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>8.6</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Network</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Medium</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>None</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>None</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>Complete</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows disruption of service<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
<div id="vulnCvss2EvaluatorImpactPara"
|
||
data-testid="vuln-evaluator-impact-section">
|
||
<h3>Evaluator Impact</h3>
|
||
<p data-testid="vuln-evaluator-impact-description">The impact of this vulnerability has yet to be determined. The full list of affected platforms is subject to change. The NVD will continue to monitor this vulnerability and adjust the configurations as needed.</p>
|
||
</div>
|
||
|
||
<div id="vulnCommentsPanel"
|
||
data-testid="vuln-comments-container">
|
||
<h3>
|
||
Vendor Statements (<a href="/vuln/vendor-comments"
|
||
target="_blank" rel="noopener noreferrer">disclaimer</a>)
|
||
</h3>
|
||
|
||
<div class="bs-callout bs-callout-info" data-testid="vuln-comments-row-0">
|
||
<h4>Official Statement from Red Hat (09/08/2009)</h4>
|
||
<p>The attacks reported by Outpost24 AB target the design limitations of the TCP protocol. Due to upstreams decision not to release updates, Red Hat do not plan to release updates to resolve these issues however, the effects of these attacks can be reduced via the mitigation methods as written in http://kbase.redhat.com/faq/docs/DOC-18730.</div>
|
||
|
||
</div>
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="http://blog.robertlee.name/2008/10/conjecture-speculation.html"
|
||
target="_blank" rel="noopener noreferrer">http://blog.robertlee.name/2008/10/conjecture-speculation.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="http://blog.robertlee.name/2008/10/conjecture-speculation.html"
|
||
target="_blank" rel="noopener noreferrer">http://blog.robertlee.name/2008/10/conjecture-speculation.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="http://insecure.org/stf/tcp-dos-attack-explained.html"
|
||
target="_blank" rel="noopener noreferrer">http://insecure.org/stf/tcp-dos-attack-explained.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="http://insecure.org/stf/tcp-dos-attack-explained.html"
|
||
target="_blank" rel="noopener noreferrer">http://insecure.org/stf/tcp-dos-attack-explained.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-4">
|
||
<td data-testid="vuln-hyperlinks-link-4">
|
||
<a
|
||
href="http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html"
|
||
target="_blank" rel="noopener noreferrer">http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-4">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-5">
|
||
<td data-testid="vuln-hyperlinks-link-5">
|
||
<a
|
||
href="http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html"
|
||
target="_blank" rel="noopener noreferrer">http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-5">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-6">
|
||
<td data-testid="vuln-hyperlinks-link-6">
|
||
<a
|
||
href="http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||
target="_blank" rel="noopener noreferrer">http://marc.info/?l=bugtraq&m=125856010926699&w=2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-6">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-7">
|
||
<td data-testid="vuln-hyperlinks-link-7">
|
||
<a
|
||
href="http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||
target="_blank" rel="noopener noreferrer">http://marc.info/?l=bugtraq&m=125856010926699&w=2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-7">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-8">
|
||
<td data-testid="vuln-hyperlinks-link-8">
|
||
<a
|
||
href="http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||
target="_blank" rel="noopener noreferrer">http://marc.info/?l=bugtraq&m=125856010926699&w=2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-8">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-9">
|
||
<td data-testid="vuln-hyperlinks-link-9">
|
||
<a
|
||
href="http://marc.info/?l=bugtraq&m=125856010926699&w=2"
|
||
target="_blank" rel="noopener noreferrer">http://marc.info/?l=bugtraq&m=125856010926699&w=2</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-9">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-10">
|
||
<td data-testid="vuln-hyperlinks-link-10">
|
||
<a
|
||
href="http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked"
|
||
target="_blank" rel="noopener noreferrer">http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-10">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-11">
|
||
<td data-testid="vuln-hyperlinks-link-11">
|
||
<a
|
||
href="http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked"
|
||
target="_blank" rel="noopener noreferrer">http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-11">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-12">
|
||
<td data-testid="vuln-hyperlinks-link-12">
|
||
<a
|
||
href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml"
|
||
target="_blank" rel="noopener noreferrer">http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-12">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-13">
|
||
<td data-testid="vuln-hyperlinks-link-13">
|
||
<a
|
||
href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml"
|
||
target="_blank" rel="noopener noreferrer">http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-13">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-14">
|
||
<td data-testid="vuln-hyperlinks-link-14">
|
||
<a
|
||
href="http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-14">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-15">
|
||
<td data-testid="vuln-hyperlinks-link-15">
|
||
<a
|
||
href="http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-15">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-16">
|
||
<td data-testid="vuln-hyperlinks-link-16">
|
||
<a
|
||
href="http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf"
|
||
target="_blank" rel="noopener noreferrer">http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-16">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-17">
|
||
<td data-testid="vuln-hyperlinks-link-17">
|
||
<a
|
||
href="http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf"
|
||
target="_blank" rel="noopener noreferrer">http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-17">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-18">
|
||
<td data-testid="vuln-hyperlinks-link-18">
|
||
<a
|
||
href="http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDVSA-2013:150</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-18">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-19">
|
||
<td data-testid="vuln-hyperlinks-link-19">
|
||
<a
|
||
href="http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||
target="_blank" rel="noopener noreferrer">http://www.mandriva.com/security/advisories?name=MDVSA-2013:150</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-19">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-20">
|
||
<td data-testid="vuln-hyperlinks-link-20">
|
||
<a
|
||
href="http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-20">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-21">
|
||
<td data-testid="vuln-hyperlinks-link-21">
|
||
<a
|
||
href="http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-21">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-22">
|
||
<td data-testid="vuln-hyperlinks-link-22">
|
||
<a
|
||
href="http://www.outpost24.com/news/news-2008-10-02.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.outpost24.com/news/news-2008-10-02.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-22">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-23">
|
||
<td data-testid="vuln-hyperlinks-link-23">
|
||
<a
|
||
href="http://www.outpost24.com/news/news-2008-10-02.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.outpost24.com/news/news-2008-10-02.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-23">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-24">
|
||
<td data-testid="vuln-hyperlinks-link-24">
|
||
<a
|
||
href="http://www.us-cert.gov/cas/techalerts/TA09-251A.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.us-cert.gov/cas/techalerts/TA09-251A.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-24">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-25">
|
||
<td data-testid="vuln-hyperlinks-link-25">
|
||
<a
|
||
href="http://www.us-cert.gov/cas/techalerts/TA09-251A.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.us-cert.gov/cas/techalerts/TA09-251A.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-25">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-26">
|
||
<td data-testid="vuln-hyperlinks-link-26">
|
||
<a
|
||
href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048"
|
||
target="_blank" rel="noopener noreferrer">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-26">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-27">
|
||
<td data-testid="vuln-hyperlinks-link-27">
|
||
<a
|
||
href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048"
|
||
target="_blank" rel="noopener noreferrer">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-27">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-28">
|
||
<td data-testid="vuln-hyperlinks-link-28">
|
||
<a
|
||
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340"
|
||
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-28">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-29">
|
||
<td data-testid="vuln-hyperlinks-link-29">
|
||
<a
|
||
href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340"
|
||
target="_blank" rel="noopener noreferrer">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-29">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-30">
|
||
<td data-testid="vuln-hyperlinks-link-30">
|
||
<a
|
||
href="https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-30">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-31">
|
||
<td data-testid="vuln-hyperlinks-link-31">
|
||
<a
|
||
href="https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-31">
|
||
<span>
|
||
<span class="badge">Broken Link</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/16.html" target="_blank" rel="noopener noreferrer">CWE-16</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Configuration</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-CWEs-row-1">
|
||
<td data-testid="vuln-CWEs-link-1">
|
||
|
||
<span>NVD-CWE-noinfo</span>
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-1">Insufficient Information</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-1">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-1-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2008-4609"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":2032,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absd%3Absd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsd:bsd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsd:bsd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0","id":"13659659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absd%3Absd%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsd:bsd:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsd:bsd:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1","id":"13658309","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absd%3Absd%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsd:bsd:4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2","id":"13660156","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absd%3Absd%3A4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsd:bsd:4.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-3","id":"13659581","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absd%3Absd%3A4.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsd:bsd:4.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-4","id":"13658901","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-5","id":"13660169","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-6","id":"13658215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-7","id":"13658822","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A2.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:2.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-8","id":"13660157","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-9","id":"13659301","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-10","id":"13659318","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-11","id":"13659368","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-12","id":"13658898","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-13","id":"13660158","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A4.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:4.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:4.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-14","id":"13659369","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-15","id":"13658533","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Absdi%3Absd_os%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:bsdi:bsd_os:4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:bsdi:bsd_os:4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-16","id":"13659582","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-17","id":"13659376","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-18","id":"13659212","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A4.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:4.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:4.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-19","id":"13660200","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A4.1.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:4.1.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:4.1.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-20","id":"13658817","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-21","id":"13659500","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A8.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:8.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:8.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-22","id":"13660031","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A9.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:9.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:9.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-23","id":"13660044","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A9.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:9.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-24","id":"13658382","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A9.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:9.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-25","id":"13659524","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-26","id":"13658227","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-27","id":"13658924","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.3%5C%283.3%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.3\\(3.3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.3%283.3%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-28","id":"13659922","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.3%5C%283.4%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.3\\(3.4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.3%283.4%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-29","id":"13658745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.3%5C%284.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.3\\(4.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.3%284.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-30","id":"13658935","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.3%5C%284.3%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.3\\(4.3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.3%284.3%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-31","id":"13658936","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.3%5C%2816%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.3\\(16\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.3%2816%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-32","id":"13658708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A10.3%5C%2819a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:10.3\\(19a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:10.3%2819a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-33","id":"13659663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-34","id":"13659680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-35","id":"13658925","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%2812%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(12\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%2812%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-36","id":"13658559","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%2817%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(17\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%2817%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-37","id":"13658910","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%2817%5C%29bt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(17\\)bt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%2817%29bt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-38","id":"13659113","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%2818%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(18\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%2818%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-39","id":"13659114","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%2820.3%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(20.3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%2820.3%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-40","id":"13658280","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%2822a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(22a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%2822a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-41","id":"13659694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%2822b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(22b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%2822b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-42","id":"13659380","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0%5C%28x%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0\\(x\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0%28x%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-43","id":"13659681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.0.12%5C%28a%5C%29bt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.0.12\\(a\\)bt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.0.12%28a%29bt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-44","id":"13658560","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-45","id":"13659664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-46","id":"13658567","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-47","id":"13659670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%287%5C%29aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(7\\)aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%287%29aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-48","id":"13659118","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%287%5C%29ca%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(7\\)ca:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%287%29ca","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-49","id":"13658914","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%289%5C%29ia%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(9\\)ia:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%289%29ia","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-50","id":"13659384","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2811%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(11\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2811%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-51","id":"13658470","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2812%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(12\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2812%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-52","id":"13658248","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2813%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2813%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-53","id":"13658415","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2813%5C%29aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2813%29aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-54","id":"13659695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2813%5C%29ca%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2813%29ca","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-55","id":"13658826","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2813%5C%29ia%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2813%29ia","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-56","id":"13658570","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2814%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(14\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2814%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-57","id":"13659116","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2815%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(15\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2815%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-58","id":"13658746","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2815%5C%29aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(15\\)aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2815%29aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-59","id":"13658563","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2815%5C%29ca%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2815%29ca","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-60","id":"13658471","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2815%5C%29ia%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(15\\)ia:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2815%29ia","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-61","id":"13658912","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2816%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2816%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-62","id":"13658864","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2816%5C%29aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2816%29aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-63","id":"13658414","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2816%5C%29ia%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2816%29ia","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-64","id":"13659686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2817%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(17\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2817%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-65","id":"13659476","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2817%5C%29cc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2817%29cc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-66","id":"13659383","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2817%5C%29ct%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2817%29ct","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-67","id":"13659634","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2818%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(18\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2818%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-68","id":"13658564","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2820%5C%29aa4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(20\\)aa4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2820%29aa4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-69","id":"13658562","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2822%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(22\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2822%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-70","id":"13658396","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2824%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(24\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2824%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-71","id":"13659687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2824a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(24a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2824a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-72","id":"13659668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2824b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(24b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2824b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-73","id":"13659475","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2824c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(24c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2824c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-74","id":"13659928","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2828a%5C%29ct%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(28a\\)ct:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2828a%29ct","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-75","id":"13659696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2828a%5C%29ia%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(28a\\)ia:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2828a%29ia","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-76","id":"13659697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2836%5C%29ca2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(36\\)ca2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2836%29ca2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-77","id":"13658310","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2836%5C%29ca4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(36\\)ca4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2836%29ca4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-78","id":"13659685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2836%5C%29cc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(36\\)cc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2836%29cc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-79","id":"13659667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1%5C%2836%5C%29cc4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1\\(36\\)cc4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1%2836%29cc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-80","id":"13659926","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-81","id":"13659927","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1ca%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1ca:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1ca","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-82","id":"13658940","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1cc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1cc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-83","id":"13659119","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1ct%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1ct:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1ct","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-84","id":"13658383","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.1ia%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.1ia:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.1ia","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-85","id":"13658417","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-86","id":"13658944","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-87","id":"13658946","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%284%5C%29f%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(4\\)f:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%284%29f","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-88","id":"13658257","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%284%5C%29f1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%284%29f1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-89","id":"13659121","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%284%5C%29xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(4\\)xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%284%29xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-90","id":"13659689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%284%5C%29xaf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(4\\)xaf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%284%29xaf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-91","id":"13658709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%288%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%288%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-92","id":"13659381","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%288%5C%29p%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%288%29p","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-93","id":"13658712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%288%5C%29sa1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%288%29sa1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-94","id":"13658945","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%288%5C%29sa3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%288%29sa3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-95","id":"13658571","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%288%5C%29sa5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%288%29sa5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-96","id":"13659672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%288.2%5C%29sa6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%288.2%29sa6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-97","id":"13658938","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%288.9%5C%29sa6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(8.9\\)sa6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%288.9%29sa6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-98","id":"13659378","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%289%5C%29p%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%289%29p","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-99","id":"13659671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%289%5C%29xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%289%29xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-100","id":"13659691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2810%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2810%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-101","id":"13659930","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2810%5C%29bc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2810%29bc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-102","id":"13659673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2811%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(11\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2811%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-103","id":"13658710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2811b%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(11b\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2811b%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-104","id":"13659929","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2814%5C%29gs2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(14\\)gs2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2814%29gs2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-105","id":"13659674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2815%5C%29g%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(15\\)g:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2815%29g","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-106","id":"13658569","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2815a%5C%29p%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(15a\\)p:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2815a%29p","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-107","id":"13658568","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2815b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(15b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2815b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-108","id":"13658362","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2816%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(16\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2816%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-109","id":"13658947","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2816%5C%29p%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(16\\)p:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2816%29p","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-110","id":"13658472","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2817%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2817%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-111","id":"13659931","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2818%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(18\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2818%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-112","id":"13658916","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2819%5C%29gs0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(19\\)gs0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2819%29gs0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-113","id":"13658943","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2819a%5C%29gs6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(19a\\)gs6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2819a%29gs6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-114","id":"13659690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2823a%5C%29bc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(23a\\)bc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2823a%29bc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-115","id":"13659698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2826%5C%29p2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(26\\)p2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2826%29p2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-116","id":"13659379","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2826%5C%29p5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(26\\)p5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2826%29p5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-117","id":"13658256","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2826a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(26a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2826a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-118","id":"13658941","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2826b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(26b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2826b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-119","id":"13658942","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2%5C%2826e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2\\(26e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2%2826e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-120","id":"13658928","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2bc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2bc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2bc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-121","id":"13658418","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2f%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2f:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2f","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-122","id":"13658278","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2gs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2gs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2gs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-123","id":"13659688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2p%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2p","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-124","id":"13659120","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2sa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2sa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2sa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-125","id":"13658913","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2wa3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2wa3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2wa3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-126","id":"13659669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2wa4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2wa4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2wa4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-127","id":"13659117","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.2xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.2xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.2xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-128","id":"13658209","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-129","id":"13658915","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-130","id":"13658416","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%281%5C%29ed%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%281%29ed","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-131","id":"13658939","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%281%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%281%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-132","id":"13659925","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%282%5C%29xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(2\\)xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%282%29xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-133","id":"13659666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%287%5C%29db1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(7\\)db1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%287%29db1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-134","id":"13658926","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%288%5C%29db2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(8\\)db2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%288%29db2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-135","id":"13659682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%288%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(8\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%288%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-136","id":"13658937","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%2811%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(11\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%2811%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-137","id":"13659924","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%2811b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(11b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%2811b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-138","id":"13658212","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%2811b%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(11b\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%2811b%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-139","id":"13659115","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%2811c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(11c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%2811c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-140","id":"13659923","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3%5C%2811d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3\\(11d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3%2811d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-141","id":"13659665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-142","id":"13658911","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3da%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3da","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-143","id":"13658566","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3db%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3db","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-144","id":"13658927","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3ha%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3ha","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-145","id":"13659377","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3ma%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3ma","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-146","id":"13658321","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3na%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3na","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-147","id":"13658561","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-148","id":"13659684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3wa4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3wa4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3wa4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-149","id":"13659683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A11.3xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:11.3xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-150","id":"13658231","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-151","id":"13659676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-152","id":"13659123","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%281%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(1\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%281%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-153","id":"13658930","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%281%5C%29st%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(1\\)st:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%281%29st","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-154","id":"13658949","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%281%5C%29w%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%281%29w","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-155","id":"13658413","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%281%5C%29xa3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%281%29xa3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-156","id":"13659693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%281%5C%29xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%281%29xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-157","id":"13658572","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%281%5C%29xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%281%29xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-158","id":"13659124","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-159","id":"13658565","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282%5C%29xc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282%29xc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-160","id":"13659675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282%5C%29xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282%29xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-161","id":"13658629","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282%5C%29xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282%29xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-162","id":"13659713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282%5C%29xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282%29xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-163","id":"13658948","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282%5C%29xg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282%29xg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-164","id":"13658747","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-165","id":"13659485","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%282b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%282b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-166","id":"13659939","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-167","id":"13658952","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-168","id":"13659936","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283%5C%29xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3\\)xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283%29xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-169","id":"13658719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-170","id":"13659410","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283.3%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3.3\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283.3%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-171","id":"13659764","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283.4%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3.4\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283.4%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-172","id":"13659400","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283.6%5C%29w5%5C%289.0.5%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3.6\\)w5\\(9.0.5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283.6%29w5%289.0.5%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-173","id":"13658408","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%283d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%283d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-174","id":"13658990","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-175","id":"13659408","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%284%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%284%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-176","id":"13659760","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%284%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%284%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-177","id":"13659387","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%284%5C%29xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%284%29xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-178","id":"13659132","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%284%5C%29xe1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(4\\)xe1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%284%29xe1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-179","id":"13658991","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%284%5C%29xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(4\\)xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%284%29xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-180","id":"13658437","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%284%5C%29xm1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(4\\)xm1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%284%29xm1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-181","id":"13659941","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-182","id":"13658265","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-183","id":"13659942","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-184","id":"13659741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-185","id":"13658298","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-186","id":"13659396","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-187","id":"13659719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-188","id":"13659765","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc2b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc2b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-189","id":"13659940","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-190","id":"13658389","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc3b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc3b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-191","id":"13659740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc5a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc5a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc5a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-192","id":"13658837","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2805%5C%29wc8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(05\\)wc8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2805%29wc8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-193","id":"13658931","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-194","id":"13658984","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc9a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc9a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-195","id":"13658833","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-196","id":"13659714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wc13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wc13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wc13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-197","id":"13658424","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29wx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)wx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29wx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-198","id":"13659739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-199","id":"13659392","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-200","id":"13659718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29xk2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)xk2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29xk2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-201","id":"13658436","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29xn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)xn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29xn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-202","id":"13659747","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29xn1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)xn1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29xn1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-203","id":"13659948","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29xs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)xs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29xs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-204","id":"13659947","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29xu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)xu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29xu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-205","id":"13659413","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285%5C%29yb4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5\\)yb4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285%29yb4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-206","id":"13658340","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285.1%5C%29xp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285.1%29xp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-207","id":"13659943","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285.2%5C%29xu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285.2%29xu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-208","id":"13658975","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285.3%5C%29wc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5.3\\)wc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285.3%29wc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-209","id":"13658720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285.4%5C%29wc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5.4\\)wc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285.4%29wc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-210","id":"13658974","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%285a%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(5a\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%285a%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-211","id":"13658356","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-212","id":"13658286","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%286b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%286b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-213","id":"13659137","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29db2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)db2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29db2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-214","id":"13658630","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29dc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)dc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29dc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-215","id":"13659412","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-216","id":"13658831","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29sc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)sc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29sc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-217","id":"13658290","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-218","id":"13659133","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-219","id":"13658997","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-220","id":"13659772","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29wx5%5C%2815a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)wx5\\(15a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29wx5%2815a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-221","id":"13659728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-222","id":"13659729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xe2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xe2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xe2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-223","id":"13659748","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-224","id":"13659404","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xf1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xf1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xf1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-225","id":"13659139","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-226","id":"13658631","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xk2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xk2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xk2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-227","id":"13659771","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xk3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xk3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xk3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-228","id":"13659138","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287%5C%29xv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7\\)xv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287%29xv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-229","id":"13658963","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287.4%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7.4\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287.4%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-230","id":"13658588","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%287a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%287a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-231","id":"13658976","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%288%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%288%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-232","id":"13659944","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%288%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%288%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-233","id":"13658220","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%288.0.2%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(8.0.2\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%288.0.2%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-234","id":"13658432","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%288.3%5C%29sc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(8.3\\)sc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%288.3%29sc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-235","id":"13658727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%288a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%288a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-236","id":"13659414","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%289%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%289%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-237","id":"13658380","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%289%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%289%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-238","id":"13658583","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%289%5C%29s8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%289%29s8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-239","id":"13658751","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%289a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%289a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-240","id":"13658479","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-241","id":"13659703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810%5C%29s3b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10\\)s3b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810%29s3b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-242","id":"13659692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810%5C%29s7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810%29s7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-243","id":"13658932","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810%5C%29s8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10\\)s8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810%29s8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-244","id":"13658825","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810%5C%29w5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10\\)w5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810%29w5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-245","id":"13658918","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810%5C%29w5%5C%2818f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810%29w5%2818f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-246","id":"13658917","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810%5C%29w5%5C%2818g%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18g\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810%29w5%2818g%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-247","id":"13659122","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2810a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2810a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-248","id":"13658950","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2811%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2811%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-249","id":"13659699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2811%5C%29st4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2811%29st4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-250","id":"13658920","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2811a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2811a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-251","id":"13659701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2812%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(12\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2812%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-252","id":"13658576","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2812%5C%29s3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(12\\)s3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2812%29s3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-253","id":"13659702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2812%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(12\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2812%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-254","id":"13658713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2812a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2812a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-255","id":"13658865","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2813%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(13\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2813%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-256","id":"13659700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2813%5C%29s8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(13\\)s8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2813%29s8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-257","id":"13658933","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2813%5C%29w5%5C%2819c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(13\\)w5\\(19c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2813%29w5%2819c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-258","id":"13658919","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2813%5C%29wt6%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(13\\)wt6\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2813%29wt6%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-259","id":"13658350","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2813a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2813a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-260","id":"13659642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2814%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(14\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2814%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-261","id":"13658473","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2814%5C%29s7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(14\\)s7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2814%29s7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-262","id":"13658573","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2814%5C%29s8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(14\\)s8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2814%29s8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-263","id":"13658419","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2814%5C%29st%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(14\\)st:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2814%29st","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-264","id":"13659677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2814%5C%29st3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(14\\)st3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2814%29st3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-265","id":"13658934","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2814%5C%29w5%5C%2820%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(14\\)w5\\(20\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2814%29w5%2820%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-266","id":"13659125","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2814a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2814a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-267","id":"13658921","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2815%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(15\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2815%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-268","id":"13659382","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2815%5C%29s3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(15\\)s3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2815%29s3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-269","id":"13658346","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2815%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(15\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2815%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-270","id":"13659477","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2815%5C%29s7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(15\\)s7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2815%29s7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-271","id":"13659385","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2815%5C%29sc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(15\\)sc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2815%29sc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-272","id":"13658423","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2815%5C%29sl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(15\\)sl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2815%29sl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-273","id":"13658575","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2815a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2815a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-274","id":"13658827","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-275","id":"13658929","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29s8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)s8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29s8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-276","id":"13658714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29s8a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)s8a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29s8a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-277","id":"13659678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29s10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)s10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29s10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-278","id":"13659710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29sc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)sc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29sc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-279","id":"13659759","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29sc3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)sc3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29sc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-280","id":"13658207","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29st%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)st:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29st","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-281","id":"13658384","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29st1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)st1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29st1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-282","id":"13658474","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816%5C%29w5%5C%2821%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16\\)w5\\(21\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816%29w5%2821%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-283","id":"13658922","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816.06%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16.06\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816.06%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-284","id":"13658268","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2816a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2816a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-285","id":"13658421","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-286","id":"13658828","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-287","id":"13659704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-288","id":"13659705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29s7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)s7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29s7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-289","id":"13659478","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29sl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)sl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29sl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-290","id":"13658832","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29sl2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)sl2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29sl2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-291","id":"13659126","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29sl6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)sl6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29sl6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-292","id":"13659679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29sl9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)sl9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29sl9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-293","id":"13658923","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29st1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)st1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29st1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-294","id":"13659706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29st5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)st5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29st5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-295","id":"13659711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817%5C%29st8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17\\)st8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817%29st8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-296","id":"13658749","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2817a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2817a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-297","id":"13658420","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-298","id":"13659932","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818%5C%29s5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18\\)s5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818%29s5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-299","id":"13658433","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818%5C%29s5a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18\\)s5a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818%29s5a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-300","id":"13658711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818%5C%29s7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18\\)s7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818%29s7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-301","id":"13658422","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818%5C%29sl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18\\)sl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818%29sl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-302","id":"13658829","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818%5C%29st1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18\\)st1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818%29st1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-303","id":"13658951","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818%5C%29w5%5C%2822b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18\\)w5\\(22b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818%29w5%2822b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-304","id":"13659708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2818b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2818b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-305","id":"13659707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-306","id":"13658748","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-307","id":"13659479","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29s2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)s2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29s2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-308","id":"13659480","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29s2a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)s2a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29s2a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-309","id":"13658982","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-310","id":"13658981","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29sl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)sl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29sl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-311","id":"13659127","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29sl4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)sl4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29sl4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-312","id":"13659386","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-313","id":"13658983","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29st%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)st:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29st","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-314","id":"13659712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29st2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)st2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29st2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-315","id":"13659709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819%5C%29st6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19\\)st6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819%29st6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-316","id":"13658574","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2819a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(19a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2819a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-317","id":"13659933","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29sl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)sl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29sl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-318","id":"13658427","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-319","id":"13659481","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29sp1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)sp1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29sp1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-320","id":"13658434","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29st2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)st2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29st2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-321","id":"13658723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29st6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)st6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29st6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-322","id":"13659758","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29st7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)st7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29st7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-323","id":"13659934","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29sx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)sx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29sx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-324","id":"13659935","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820%5C%29w5%5C%2822b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20\\)w5\\(22b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820%29w5%2822b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-325","id":"13658953","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820.4%5C%29sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20.4\\)sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820.4%29sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-326","id":"13658586","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2820a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(20a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2820a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-327","id":"13659128","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-328","id":"13659482","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-329","id":"13659397","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29s3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)s3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29s3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-330","id":"13659398","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29s4a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)s4a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29s4a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-331","id":"13658715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29s5a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)s5a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29s5a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-332","id":"13658954","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-333","id":"13658985","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29s7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)s7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29s7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-334","id":"13658214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29sl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)sl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29sl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-335","id":"13658956","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29st%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)st:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29st","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-336","id":"13658475","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29st6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)st6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29st6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-337","id":"13658392","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29st7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)st7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29st7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-338","id":"13658582","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821%5C%29sx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21\\)sx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821%29sx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-339","id":"13659734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2821a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(21a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2821a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-340","id":"13658830","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2822%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(22\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2822%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-341","id":"13659388","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2822%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(22\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2822%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-342","id":"13659761","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2822%5C%29s5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(22\\)s5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2822%29s5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-343","id":"13658986","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2822%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(22\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2822%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-344","id":"13658269","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2823%5C%29s2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(23\\)s2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2823%29s2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-345","id":"13659129","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2823%5C%29s3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(23\\)s3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2823%29s3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-346","id":"13659399","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2823%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2823%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-347","id":"13659735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2823%5C%29s5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2823%29s5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-348","id":"13659389","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2823%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(23\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2823%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-349","id":"13658955","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2823%5C%29sx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(23\\)sx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2823%29sx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-350","id":"13659409","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2823%5C%29sz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(23\\)sz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2823%29sz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-351","id":"13658724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2824%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(24\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2824%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-352","id":"13658838","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2824%5C%29s2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(24\\)s2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2824%29s2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-353","id":"13658988","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2824%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2824%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-354","id":"13659390","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2824%5C%29s5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2824%29s5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-355","id":"13659716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2824%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(24\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2824%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-356","id":"13659736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2824.2%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(24.2\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2824.2%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-357","id":"13658834","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2825%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(25\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2825%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-358","id":"13659130","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2825%5C%29w5%5C%2827%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2825%29w5%2827%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-359","id":"13659484","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2825%5C%29w5%5C%2827c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2825%29w5%2827c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-360","id":"13658987","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2825%5C%29w5-27d%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(25\\)w5-27d:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2825%29w5-27d","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-361","id":"13659762","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2825.4%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(25.4\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2825.4%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-362","id":"13658957","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2826%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(26\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2826%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-363","id":"13659715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2826%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(26\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2826%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-364","id":"13658428","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2826%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2826%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-365","id":"13659635","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2826%5C%29s2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(26\\)s2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2826%29s2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-366","id":"13659937","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2826%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(26\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2826%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-367","id":"13659483","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2826%5C%29w5%5C%2828%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2826%29w5%2828%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-368","id":"13658958","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2826%5C%29w5%5C%2828a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2826%29w5%2828a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-369","id":"13658989","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2827%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(27\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2827%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-370","id":"13658969","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2827%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2827%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-371","id":"13658245","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2827%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(27\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2827%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-372","id":"13658750","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2827%5C%29sv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2827%29sv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-373","id":"13658968","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2827%5C%29sv1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2827%29sv1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-374","id":"13659763","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2827%5C%29sv2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(27\\)sv2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2827%29sv2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-375","id":"13658252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-376","id":"13658577","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828%5C%29s3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28\\)s3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828%29s3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-377","id":"13658435","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828%5C%29s5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28\\)s5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828%29s5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-378","id":"13659737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828%5C%29w5%5C%2831a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28\\)w5\\(31a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828%29w5%2831a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-379","id":"13659391","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828%5C%29w5-30b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-30b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828%29w5-30b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-380","id":"13658967","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828%5C%29w5-32a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-32a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828%29w5-32a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-381","id":"13658429","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-382","id":"13658320","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2828d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(28d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2828d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-383","id":"13659131","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2830%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(30\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2830%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-384","id":"13659738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2830%5C%29s2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(30\\)s2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2830%29s2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-385","id":"13658430","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2830%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(30\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2830%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-386","id":"13659717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2831%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(31\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2831%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-387","id":"13658381","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0%5C%2831%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0\\(31\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0%2831%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-388","id":"13659938","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0da%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0da","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-389","id":"13659401","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0db%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0db","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-390","id":"13658992","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0dc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0dc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-391","id":"13658387","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0ev%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0ev:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0ev","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-392","id":"13658717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-393","id":"13659720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0sc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0sc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-394","id":"13659487","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0sl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0sl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-395","id":"13659136","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-396","id":"13659395","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0st%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0st","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-397","id":"13658283","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0sv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0sv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-398","id":"13658425","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0sx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0sx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-399","id":"13659769","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-400","id":"13659486","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0sz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0sz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-401","id":"13658994","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-402","id":"13658973","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0w5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0w5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-403","id":"13658972","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0wc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0wc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-404","id":"13659725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0wt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0wt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-405","id":"13659724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0wx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0wx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-406","id":"13659727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-407","id":"13659394","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-408","id":"13658995","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-409","id":"13658225","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-410","id":"13658431","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-411","id":"13658478","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-412","id":"13659726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-413","id":"13659745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-414","id":"13659135","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-415","id":"13659946","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-416","id":"13658587","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-417","id":"13658235","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-418","id":"13658716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-419","id":"13659767","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-420","id":"13659403","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-421","id":"13659722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-422","id":"13658403","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-423","id":"13658251","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-424","id":"13658726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-425","id":"13659768","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-426","id":"13658961","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-427","id":"13659723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.0xw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.0xw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-428","id":"13659742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-429","id":"13658971","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-430","id":"13659744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29db%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\)db:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29db","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-431","id":"13658970","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29db2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\)db2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29db2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-432","id":"13659134","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29dc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\)dc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29dc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-433","id":"13658476","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29dc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\)dc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29dc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-434","id":"13658725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29e5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\)e5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29e5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-435","id":"13659766","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-436","id":"13658996","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-437","id":"13659393","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281.3%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1.3\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281.3%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-438","id":"13658959","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281a%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1a\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281a%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-439","id":"13658405","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-440","id":"13659488","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%282%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(2\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%282%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-441","id":"13658216","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%282%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%282%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-442","id":"13659781","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%282%5C%29xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(2\\)xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%282%29xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-443","id":"13659733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%282%5C%29xf4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(2\\)xf4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%282%29xf4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-444","id":"13659732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%282%5C%29xf5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(2\\)xf5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%282%29xf5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-445","id":"13658369","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%282b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%282b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-446","id":"13659560","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-447","id":"13659559","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29db1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)db1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29db1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-448","id":"13658519","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29dc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)dc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29dc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-449","id":"13659755","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-450","id":"13659754","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29xi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)xi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29xi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-451","id":"13658365","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29xp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)xp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29xp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-452","id":"13659010","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29xp4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)xp4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29xp4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-453","id":"13660110","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29xq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)xq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29xq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-454","id":"13658794","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29xt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)xt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29xt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-455","id":"13659031","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283%5C%29xt3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3\\)xt3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283%29xt3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-456","id":"13659812","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-457","id":"13658443","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283a%5C%29e7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3a\\)e7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283a%29e7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-458","id":"13658848","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283a%5C%29e8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3a\\)e8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283a%29e8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-459","id":"13659837","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283a%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3a\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283a%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-460","id":"13659026","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283a%5C%29t7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3a\\)t7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283a%29t7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-461","id":"13658373","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283a%5C%29xi8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3a\\)xi8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283a%29xi8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-462","id":"13658590","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%283b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(3b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%283b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-463","id":"13659794","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-464","id":"13659269","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29db%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)db:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29db","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-465","id":"13660109","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29db1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)db1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29db1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-466","id":"13659836","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29db2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)db2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29db2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-467","id":"13659835","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29dc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)dc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29dc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-468","id":"13658391","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29dc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)dc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29dc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-469","id":"13658311","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-470","id":"13658843","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29ea1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)ea1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29ea1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-471","id":"13660108","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29xm4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)xm4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29xm4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-472","id":"13659268","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29xz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)xz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29xz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-473","id":"13659793","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284%5C%29xz7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4\\)xz7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284%29xz7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-474","id":"13659792","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284.3%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4.3\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284.3%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-475","id":"13658605","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%284a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(4a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%284a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-476","id":"13659437","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29da1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)da1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29da1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-477","id":"13659030","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29db1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)db1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29db1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-478","id":"13659811","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29dc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)dc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29dc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-479","id":"13659562","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29dc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)dc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29dc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-480","id":"13659267","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-481","id":"13659791","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-482","id":"13658604","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29t9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)t9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29t9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-483","id":"13659834","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29t12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)t12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29t12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-484","id":"13659790","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29t15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)t15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29t15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-485","id":"13659029","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xg5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xg5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xg5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-486","id":"13659266","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-487","id":"13659028","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xm4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xm4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xm4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-488","id":"13659009","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xm7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xm7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xm7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-489","id":"13659265","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xr2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xr2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xr2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-490","id":"13659636","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-491","id":"13659789","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xs2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xs2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xs2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-492","id":"13659043","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xu1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xu1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xu1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-493","id":"13659044","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-494","id":"13658593","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xv3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xv3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xv3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-495","id":"13659027","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xv4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xv4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xv4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-496","id":"13658522","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xv5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xv5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xv5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-497","id":"13659264","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29xy6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)xy6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29xy6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-498","id":"13659042","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29ya%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)ya:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29ya","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-499","id":"13659784","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29ya2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)ya2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29ya2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-500","id":"13659023","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-501","id":"13658735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yb4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yb4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yb4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-502","id":"13658887","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yb5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yb5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yb5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-503","id":"13659024","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-504","id":"13659006","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-505","id":"13658677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-506","id":"13658603","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-507","id":"13658305","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yd2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yd2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yd2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-508","id":"13659025","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yd6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yd6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yd6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-509","id":"13658847","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-510","id":"13660105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yf2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yf2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yf2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-511","id":"13658402","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yf4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yf4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yf4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-512","id":"13659785","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-513","id":"13658378","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yh3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yh3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yh3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-514","id":"13659786","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-515","id":"13659830","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285%5C%29yi1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5\\)yi1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285%29yi1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-516","id":"13659829","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285a%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5a\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285a%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-517","id":"13659424","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-518","id":"13659788","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285c%5C%29e12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5c\\)e12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285c%29e12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-519","id":"13659263","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285c%5C%29ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285c%29ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-520","id":"13659832","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%285e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(5e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%285e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-521","id":"13660106","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-522","id":"13659833","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29e8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)e8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29e8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-523","id":"13659436","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29e12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)e12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29e12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-524","id":"13659007","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ea1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ea1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-525","id":"13658276","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ea1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ea1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-526","id":"13658842","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ea2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ea2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-527","id":"13659561","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ea2a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ea2a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-528","id":"13658521","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ea2b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ea2b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-529","id":"13659008","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ea2c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ea2c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-530","id":"13659787","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-531","id":"13659831","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ez1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ez1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ez1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-532","id":"13659407","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286%5C%29ez2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6\\)ez2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286%29ez2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-533","id":"13659757","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286.5%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6.5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286.5%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-534","id":"13659828","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286.5%5C%29ec3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6.5\\)ec3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286.5%29ec3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-535","id":"13659041","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%286a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(6a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%286a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-536","id":"13659004","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-537","id":"13658589","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287%5C%29cx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7\\)cx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287%29cx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-538","id":"13659262","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287%5C%29da2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7\\)da2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287%29da2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-539","id":"13660103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287%5C%29da3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7\\)da3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287%29da3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-540","id":"13658293","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287%5C%29ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7\\)ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287%29ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-541","id":"13658442","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287a%5C%29e6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7a\\)e6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287a%29e6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-542","id":"13658450","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287a%5C%29ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287a%29ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-543","id":"13659435","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287a%5C%29ey3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287a%29ey3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-544","id":"13659783","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%287b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(7b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%287b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-545","id":"13659005","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-546","id":"13658289","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288%5C%29aa1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8\\)aa1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288%29aa1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-547","id":"13660104","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-548","id":"13659810","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288%5C%29ea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8\\)ea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288%29ea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-549","id":"13660107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288%5C%29ea1b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288%29ea1b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-550","id":"13659423","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288%5C%29ea2b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8\\)ea2b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288%29ea2b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-551","id":"13659813","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288a%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8a\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288a%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-552","id":"13658844","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288a%5C%29ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288a%29ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-553","id":"13659838","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288a%5C%29ew1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288a%29ew1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-554","id":"13658451","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288a%5C%29ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288a%29ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-555","id":"13658591","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29e8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)e8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29e8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-556","id":"13659839","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29e9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)e9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29e9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-557","id":"13658845","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29e14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)e14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29e14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-558","id":"13659011","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29e15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)e15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29e15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-559","id":"13659270","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29e16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)e16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29e16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-560","id":"13659795","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29e18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)e18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29e18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-561","id":"13658444","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29e20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)e20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29e20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-562","id":"13659271","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288b%5C%29ex4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8b\\)ex4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288b%29ex4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-563","id":"13659438","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%288c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(8c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%288c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-564","id":"13658849","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-565","id":"13658839","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289%5C%29aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9\\)aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289%29aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-566","id":"13659012","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-567","id":"13659840","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-568","id":"13658850","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289%5C%29ea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9\\)ea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289%29ea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-569","id":"13658606","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289%5C%29ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289%29ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-570","id":"13658440","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289%5C%29ex3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9\\)ex3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289%29ex3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-571","id":"13659637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%289a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(9a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%289a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-572","id":"13660111","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-573","id":"13659746","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\)aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-574","id":"13659743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-575","id":"13658477","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29e4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\)e4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29e4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-576","id":"13659945","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\)ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-577","id":"13658962","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29ec1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\)ec1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29ec1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-578","id":"13658993","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\)ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-579","id":"13659411","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810%5C%29ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10\\)ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810%29ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-580","id":"13658960","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810.5%5C%29ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10.5\\)ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810.5%29ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-581","id":"13659770","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2810a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(10a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2810a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-582","id":"13659721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-583","id":"13659402","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-584","id":"13658342","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811%5C%29ea1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811%29ea1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-585","id":"13659260","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811%5C%29ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11\\)ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811%29ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-586","id":"13658448","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811.5%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11.5\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811.5%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-587","id":"13658249","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-588","id":"13658578","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-589","id":"13659827","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811b%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811b%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-590","id":"13660102","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811b%5C%29e12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811b%29e12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-591","id":"13659416","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2811b%5C%29e14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2811b%29e14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-592","id":"13658449","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-593","id":"13659749","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-594","id":"13658303","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-595","id":"13659750","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-596","id":"13658729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-597","id":"13659730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812c%5C%29e7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12c\\)e7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812c%29e7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-598","id":"13659001","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812c%5C%29ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12c\\)ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812c%29ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-599","id":"13658979","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812c%5C%29ev01%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12c\\)ev01:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812c%29ev01","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-600","id":"13659558","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2812c%5C%29ew4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(12c\\)ew4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2812c%29ew4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-601","id":"13658733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-602","id":"13659826","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29ay%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)ay:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29ay","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-603","id":"13658439","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-604","id":"13659779","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-605","id":"13658240","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29e7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)e7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29e7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-606","id":"13659753","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29e9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29e9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-607","id":"13658447","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29e12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)e12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29e12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-608","id":"13659778","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29e13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)e13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29e13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-609","id":"13659415","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29e17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)e17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29e17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-610","id":"13658793","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29ea1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29ea1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-611","id":"13658836","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29ea1c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29ea1c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-612","id":"13658718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-613","id":"13658966","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29ew4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)ew4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29ew4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-614","id":"13659777","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813%5C%29ex2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13\\)ex2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813%29ex2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-615","id":"13660100","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2813.4%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(13.4\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2813.4%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-616","id":"13658792","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-617","id":"13659773","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-618","id":"13658978","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814%5C%29e4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14\\)e4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814%29e4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-619","id":"13658581","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814%5C%29e9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14\\)e9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814%29e9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-620","id":"13658426","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814%5C%29e10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14\\)e10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814%29e10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-621","id":"13659752","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814%5C%29ea1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814%29ea1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-622","id":"13658438","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814%5C%29eb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14\\)eb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814%29eb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-623","id":"13658835","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2814.5%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(14.5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2814.5%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-624","id":"13658998","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2815%5C%29bc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(15\\)bc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2815%29bc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-625","id":"13658867","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2816%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(16\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2816%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-626","id":"13659780","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2818%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(18\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2818%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-627","id":"13659261","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2818.4%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(18.4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2818.4%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-628","id":"13659949","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-629","id":"13658980","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-630","id":"13658999","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-631","id":"13658271","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29e6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\)e6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29e6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-632","id":"13659000","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\)ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-633","id":"13658580","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\)ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-634","id":"13658218","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29ew3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\)ew3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29ew3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-635","id":"13658722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819%5C%29fc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19\\)fc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819%29fc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-636","id":"13658977","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2819.3%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(19.3\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2819.3%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-637","id":"13658632","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-638","id":"13659751","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-639","id":"13659405","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-640","id":"13658480","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-641","id":"13659140","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-642","id":"13658728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29e5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)e5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29e5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-643","id":"13659776","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ea1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ea1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-644","id":"13658579","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ea1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ea1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-645","id":"13658965","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-646","id":"13658584","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ec1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ec1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-647","id":"13658721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ec2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ec2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ec2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-648","id":"13658866","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29eo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29eo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-649","id":"13660101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29eo1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)eo1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29eo1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-650","id":"13659774","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29eo3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)eo3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29eo3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-651","id":"13659775","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-652","id":"13658964","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ew1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ew1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-653","id":"13659731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ew2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ew2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ew2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-654","id":"13658236","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2820%5C%29ew4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(20\\)ew4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2820%29ew4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-655","id":"13659782","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-656","id":"13658374","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-657","id":"13658676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-658","id":"13659406","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29ea3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29ea3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-659","id":"13658308","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29ea4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29ea4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-660","id":"13658585","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29ea4a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29ea4a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-661","id":"13659434","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29ea5a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29ea5a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-662","id":"13658602","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29ea6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29ea6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-663","id":"13658274","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2822%5C%29eb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(22\\)eb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2822%29eb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-664","id":"13659003","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2823%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(23\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2823%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-665","id":"13659756","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2823%5C%29e4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(23\\)e4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2823%29e4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-666","id":"13658520","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2826%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(26\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2826%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-667","id":"13658846","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2826%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(26\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2826%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-668","id":"13658264","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2826%5C%29eb1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(26\\)eb1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2826%29eb1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-669","id":"13659002","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2827%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(27\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2827%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-670","id":"13658734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1%5C%2827b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1\\(27b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1%2827b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-671","id":"13659417","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1aa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1aa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-672","id":"13659563","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ax%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ax","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-673","id":"13658888","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ay%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ay","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-674","id":"13659814","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1az%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1az","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-675","id":"13658595","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1cx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1cx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-676","id":"13659045","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1da%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1da","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-677","id":"13659815","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1db%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1db","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-678","id":"13658594","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1dc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1dc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-679","id":"13659273","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-680","id":"13658315","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-681","id":"13659841","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1eb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1eb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-682","id":"13659032","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-683","id":"13659047","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1eo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1eo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-684","id":"13658607","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1eu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1eu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-685","id":"13658840","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ev%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ev","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-686","id":"13659013","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-687","id":"13660113","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-688","id":"13659046","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-689","id":"13659796","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ez%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ez","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-690","id":"13659797","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ga%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ga","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-691","id":"13658889","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1gb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1gb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-692","id":"13659274","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-693","id":"13660112","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-694","id":"13659425","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1sec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1sec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1sec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-695","id":"13659418","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-696","id":"13658596","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1x%5C%28l%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1x\\(l\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1x%28l%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-697","id":"13658306","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-698","id":"13660117","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-699","id":"13658891","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-700","id":"13658316","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-701","id":"13659798","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-702","id":"13658730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-703","id":"13659845","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-704","id":"13658217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-705","id":"13659428","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-706","id":"13658255","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-707","id":"13659565","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-708","id":"13659272","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-709","id":"13658890","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-710","id":"13658253","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-711","id":"13658322","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-712","id":"13659844","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-713","id":"13658608","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-714","id":"13658445","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-715","id":"13660119","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-716","id":"13659566","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-717","id":"13659800","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-718","id":"13659016","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-719","id":"13659439","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-720","id":"13658452","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1xz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1xz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-721","id":"13658597","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ya%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ya","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-722","id":"13658349","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1yb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1yb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-723","id":"13659275","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1yc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1yc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-724","id":"13660118","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1yd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1yd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-725","id":"13658355","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1ye%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1ye","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-726","id":"13659799","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1yf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1yf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-727","id":"13658851","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1yh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1yh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-728","id":"13659049","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1yi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1yi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-729","id":"13659033","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.1yj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.1yj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-730","id":"13659817","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-731","id":"13659843","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-732","id":"13659842","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29dx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)dx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29dx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-733","id":"13659015","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-734","id":"13659014","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-735","id":"13660115","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-736","id":"13658795","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-737","id":"13659426","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xd1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xd1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xd1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-738","id":"13658261","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xd3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xd3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xd3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-739","id":"13658388","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xd4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xd4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xd4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-740","id":"13659048","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-741","id":"13660114","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xe2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xe2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xe2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-742","id":"13658841","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xe3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xe3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xe3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-743","id":"13659816","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-744","id":"13659564","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-745","id":"13658332","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-746","id":"13658260","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281%5C%29xs1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1\\)xs1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281%29xs1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-747","id":"13658523","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-748","id":"13660116","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281.1%5C%29pi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1.1\\)pi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281.1%29pi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-749","id":"13659427","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281.4%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1.4\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281.4%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-750","id":"13659454","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-751","id":"13659856","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281b%5C%29da1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1b\\)da1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281b%29da1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-752","id":"13659882","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(1d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%281d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-753","id":"13659057","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-754","id":"13659904","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29bx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)bx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29bx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-755","id":"13658239","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29by%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)by:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29by","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-756","id":"13659289","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29by2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)by2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29by2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-757","id":"13659101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29dd3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)dd3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29dd3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-758","id":"13658738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-759","id":"13659469","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-760","id":"13658410","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-761","id":"13658797","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-762","id":"13659883","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xa1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xa1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xa1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-763","id":"13659857","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xa5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xa5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xa5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-764","id":"13659468","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-765","id":"13659901","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xb3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xb3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xb3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-766","id":"13659054","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xb4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xb4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xb4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-767","id":"13658618","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xb11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xb11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xb11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-768","id":"13660129","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xb14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xb14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xb14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-769","id":"13659571","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xb15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xb15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xb15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-770","id":"13659442","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-771","id":"13659457","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-772","id":"13659902","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-773","id":"13659903","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-774","id":"13659287","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xh2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xh2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xh2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-775","id":"13659288","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xh3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xh3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xh3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-776","id":"13658852","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-777","id":"13659055","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xi1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xi1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xi1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-778","id":"13659458","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xi2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xi2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xi2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-779","id":"13659881","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-780","id":"13659572","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xj1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xj1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xj1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-781","id":"13658625","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-782","id":"13658466","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xk2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xk2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xk2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-783","id":"13659459","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-784","id":"13659884","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-785","id":"13660131","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-786","id":"13659443","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xt3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xt3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xt3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-787","id":"13660130","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-788","id":"13658798","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29xu2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)xu2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29xu2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-789","id":"13659905","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282%5C%29yc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2\\)yc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282%29yc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-790","id":"13659082","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%282.2%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(2.2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%282.2%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-791","id":"13658895","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-792","id":"13659446","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%283.4%5C%29bp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(3.4\\)bp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%283.4%29bp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-793","id":"13658208","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%283d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(3d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%283d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-794","id":"13658858","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-795","id":"13659087","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-796","id":"13658740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29b1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)b1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29b1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-797","id":"13659865","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29b2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)b2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29b2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-798","id":"13659062","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29b3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)b3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29b3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-799","id":"13658394","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29b4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)b4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29b4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-800","id":"13659575","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29bc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29bc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-801","id":"13659640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29bc1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29bc1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-802","id":"13659907","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29bx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)bx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29bx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-803","id":"13659860","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-804","id":"13659886","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ja1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ja1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ja1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-805","id":"13658527","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29mb3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)mb3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29mb3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-806","id":"13659084","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29mb12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)mb12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29mb12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-807","id":"13658456","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29mb13b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29mb13b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-808","id":"13659906","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29mb13c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29mb13c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-809","id":"13659290","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29mx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)mx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29mx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-810","id":"13659470","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29mx1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)mx1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29mx1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-811","id":"13658853","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-812","id":"13659885","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-813","id":"13658860","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-814","id":"13660132","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29t6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)t6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29t6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-815","id":"13659444","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29xl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)xl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29xl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-816","id":"13659577","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29xl4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)xl4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29xl4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-817","id":"13659295","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-818","id":"13658896","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29xm2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)xm2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29xm2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-819","id":"13658801","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29xr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)xr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29xr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-820","id":"13659110","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29xw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)xw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29xw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-821","id":"13659914","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29xw1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)xw1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29xw1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-822","id":"13659913","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ya%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ya:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ya","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-823","id":"13659891","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ya1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ya1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ya1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-824","id":"13659091","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ya7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ya7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ya7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-825","id":"13659297","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ya8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ya8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ya8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-826","id":"13659296","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ya9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ya9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ya9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-827","id":"13659912","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ya10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ya10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ya10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-828","id":"13659448","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29ya11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)ya11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29ya11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-829","id":"13658372","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%284%5C%29yb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(4\\)yb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%284%29yb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-830","id":"13659107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-831","id":"13659890","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%285%5C%29ca1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(5\\)ca1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%285%29ca1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-832","id":"13659090","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%285d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(5d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%285d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-833","id":"13658390","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%286.8%5C%29t0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%286.8%29t0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-834","id":"13659092","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%286.8%5C%29t1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%286.8%29t1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-835","id":"13658242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%286.8a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(6.8a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%286.8a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-836","id":"13658244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%286c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(6c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%286c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-837","id":"13659109","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-838","id":"13658681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%287%5C%29da%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(7\\)da:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%287%29da","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-839","id":"13660138","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%287.4%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(7.4\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%287.4%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-840","id":"13659868","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%287a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(7a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%287a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-841","id":"13659869","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%287b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(7b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%287b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-842","id":"13658223","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%287c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(7c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%287c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-843","id":"13659474","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29bc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)bc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29bc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-844","id":"13659893","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-845","id":"13659915","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-846","id":"13659108","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29t10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)t10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29t10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-847","id":"13658337","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29tpc10a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)tpc10a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29tpc10a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-848","id":"13658528","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29yd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)yd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29yd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-849","id":"13659867","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29yw2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)yw2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29yw2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-850","id":"13658324","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29yw3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)yw3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29yw3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-851","id":"13659892","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29yy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)yy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29yy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-852","id":"13658623","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29yy3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)yy3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29yy3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-853","id":"13659449","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%288%5C%29zb7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(8\\)zb7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%288%29zb7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-854","id":"13660139","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%289%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(9\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%289%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-855","id":"13658739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%289.4%5C%29da%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(9.4\\)da:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%289.4%29da","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-856","id":"13658682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2810%5C%29da2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(10\\)da2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2810%29da2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-857","id":"13658386","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2810%5C%29da4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(10\\)da4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2810%29da4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-858","id":"13659430","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2810.5%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(10.5\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2810.5%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-859","id":"13659281","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2810g%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(10g\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2810g%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-860","id":"13659038","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29bc3c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)bc3c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29bc3c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-861","id":"13659453","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-862","id":"13659078","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29ja1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)ja1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29ja1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-863","id":"13659020","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-864","id":"13659421","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-865","id":"13659039","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-866","id":"13660124","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29t8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)t8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29t8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-867","id":"13659021","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29t9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)t9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29t9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-868","id":"13658732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29yp1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)yp1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29yp1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-869","id":"13659825","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29yu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)yu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29yu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-870","id":"13658615","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29yv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)yv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29yv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-871","id":"13659809","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29yx1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)yx1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29yx1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-872","id":"13659805","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2811%5C%29yz2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(11\\)yz2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2811%29yz2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-873","id":"13659279","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-874","id":"13659569","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812%5C%29da3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12\\)da3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812%29da3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-875","id":"13659280","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812%5C%29da8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12\\)da8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812%29da8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-876","id":"13659429","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812%5C%29da9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12\\)da9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812%29da9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-877","id":"13658301","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812.02%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12.02\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812.02%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-878","id":"13659853","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812.02%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12.02\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812.02%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-879","id":"13659050","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812.05%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12.05\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812.05%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-880","id":"13659804","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812.05%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12.05\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812.05%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-881","id":"13659018","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812.05%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12.05\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812.05%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-882","id":"13659278","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-883","id":"13658329","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-884","id":"13658297","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812g%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812g%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-885","id":"13659821","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812h%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812h%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-886","id":"13659850","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812i%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12i\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812i%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-887","id":"13659851","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2812m%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(12m\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2812m%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-888","id":"13659852","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-889","id":"13659422","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29ja1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)ja1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29ja1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-890","id":"13659803","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29mc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)mc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29mc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-891","id":"13660121","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-892","id":"13659022","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-893","id":"13659277","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29t9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)t9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29t9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-894","id":"13659095","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29t14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)t14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29t14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-895","id":"13659036","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29t16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)t16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29t16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-896","id":"13659820","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-897","id":"13659849","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-898","id":"13659848","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zd3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zd3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zd3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-899","id":"13658328","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zd4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zd4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zd4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-900","id":"13659802","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29ze%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)ze:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29ze","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-901","id":"13659276","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-902","id":"13658351","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-903","id":"13659035","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-904","id":"13659638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zh3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zh3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zh3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-905","id":"13658736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zh8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zh8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zh8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-906","id":"13659282","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-907","id":"13659801","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-908","id":"13659420","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813%5C%29zl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13\\)zl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813%29zl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-909","id":"13658892","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813.03%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13.03\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813.03%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-910","id":"13660123","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-911","id":"13659808","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2813e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(13e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2813e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-912","id":"13658731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-913","id":"13659452","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29s13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)s13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29s13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-914","id":"13658614","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29s14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)s14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29s14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-915","id":"13659824","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29s15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)s15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29s15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-916","id":"13658599","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29su2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)su2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29su2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-917","id":"13658364","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29sx1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)sx1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29sx1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-918","id":"13658525","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-919","id":"13658441","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-920","id":"13659052","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29sy03%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)sy03:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29sy03","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-921","id":"13658234","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29sz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29sz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-922","id":"13659854","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29sz1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29sz1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-923","id":"13658232","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29sz2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29sz2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-924","id":"13659823","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29za%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)za:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29za","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-925","id":"13660122","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29za2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)za2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29za2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-926","id":"13658678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814%5C%29za8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14\\)za8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814%29za8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-927","id":"13659807","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814.5%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14.5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814.5%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-928","id":"13659806","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2814.5%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(14.5\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2814.5%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-929","id":"13658609","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-930","id":"13659051","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-931","id":"13659822","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-932","id":"13659037","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bc1f%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1f:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bc1f","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-933","id":"13658366","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bc2f%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2f:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bc2f","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-934","id":"13658524","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bc2h%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2h:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bc2h","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-935","id":"13659568","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bc2i%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2i:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bc2i","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-936","id":"13658592","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-937","id":"13659019","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29bz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)bz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29bz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-938","id":"13658454","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29cx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)cx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29cx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-939","id":"13658453","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29cz3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)cz3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29cz3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-940","id":"13658598","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29jk2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)jk2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29jk2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-941","id":"13659440","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29jk4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)jk4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29jk4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-942","id":"13659017","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29jk5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)jk5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29jk5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-943","id":"13659419","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29mc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)mc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29mc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-944","id":"13660120","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29mc2c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29mc2c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-945","id":"13659567","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29mc2e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29mc2e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-946","id":"13658446","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29sl1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)sl1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29sl1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-947","id":"13659819","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-948","id":"13659441","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-949","id":"13659847","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-950","id":"13659431","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-951","id":"13659079","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-952","id":"13659455","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-953","id":"13659818","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-954","id":"13659034","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29t17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)t17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29t17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-955","id":"13659846","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29xr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)xr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29xr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-956","id":"13660128","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29xr2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)xr2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29xr2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-957","id":"13659570","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29ys%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)ys:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29ys","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-958","id":"13658601","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29ys_1.2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)ys_1.2\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29ys_1.2%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-959","id":"13658273","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-960","id":"13659858","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zj1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zj1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zj1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-961","id":"13660127","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zj2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zj2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zj2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-962","id":"13659433","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zj3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zj3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zj3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-963","id":"13659432","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-964","id":"13659081","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-965","id":"13659080","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zl1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zl1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zl1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-966","id":"13659896","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-967","id":"13659097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815%5C%29zo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15\\)zo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815%29zo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-968","id":"13658600","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2815.1%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(15.1\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2815.1%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-969","id":"13660125","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2816%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(16\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2816%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-970","id":"13659456","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2816%5C%29b1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(16\\)b1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2816%29b1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-971","id":"13659040","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2816%5C%29bx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(16\\)bx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2816%29bx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-972","id":"13659096","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2816.1%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(16.1\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2816.1%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-973","id":"13659876","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2816.5%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(16.5\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2816.5%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-974","id":"13660126","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2816f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(16f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2816f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-975","id":"13659467","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-976","id":"13658617","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817%5C%29a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17\\)a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817%29a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-977","id":"13658856","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817%5C%29zd3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17\\)zd3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817%29zd3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-978","id":"13658611","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-979","id":"13659859","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817a%5C%29sxa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17a\\)sxa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817a%29sxa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-980","id":"13659880","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817b%5C%29sxa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17b\\)sxa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817b%29sxa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-981","id":"13658319","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-982","id":"13658267","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817d%5C%29sx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17d\\)sx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817d%29sx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-983","id":"13658360","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817d%5C%29sxb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817d%29sxb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-984","id":"13659900","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817d%5C%29sxb7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817d%29sxb7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-985","id":"13658855","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817d%5C%29sxb8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817d%29sxb8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-986","id":"13658464","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817d%5C%29sxb10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817d%29sxb10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-987","id":"13659098","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2817f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(17f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2817f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-988","id":"13659053","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-989","id":"13659879","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29ew2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)ew2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29ew2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-990","id":"13658406","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29ew3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)ew3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29ew3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-991","id":"13658737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29ew5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)ew5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29ew5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-992","id":"13658465","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29ewa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)ewa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29ewa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-993","id":"13659286","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-994","id":"13659898","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-995","id":"13658616","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29s8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)s8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29s8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-996","id":"13658610","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29s9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)s9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29s9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-997","id":"13658455","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29s10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)s10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29s10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-998","id":"13659878","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-999","id":"13659285","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29so4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)so4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29so4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1000","id":"13659284","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1001","id":"13659899","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sv3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sv3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sv3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1002","id":"13658742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1003","id":"13658397","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxd1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxd1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1004","id":"13658854","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxd4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxd4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1005","id":"13659877","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxd5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxd5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1006","id":"13659855","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxd6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxd6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1007","id":"13658526","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxd7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxd7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1008","id":"13659283","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1009","id":"13659897","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxe1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxe1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1010","id":"13659099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxe3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxe3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1011","id":"13658339","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818%5C%29sxf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818%29sxf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1012","id":"13658796","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2818.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(18.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2818.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1013","id":"13659100","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2819%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(19\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2819%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1014","id":"13659083","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2819%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(19\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2819%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1015","id":"13659056","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29eu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29eu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1016","id":"13658468","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29eu1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29eu1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1017","id":"13659463","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29eu2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29eu2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1018","id":"13659066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1019","id":"13659447","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29ew2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)ew2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29ew2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1020","id":"13660135","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29ew3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)ew3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29ew3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1021","id":"13658458","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29ewa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29ewa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1022","id":"13659473","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29ewa2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29ewa2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1023","id":"13659293","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29ewa3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29ewa3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1024","id":"13659888","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1025","id":"13659911","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1026","id":"13658457","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29s2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29s2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1027","id":"13658462","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1028","id":"13660136","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29s7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)s7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29s7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1029","id":"13659294","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29s8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)s8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29s8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1030","id":"13659105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29s9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)s9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29s9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1031","id":"13658744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2820%5C%29se3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2820%29se3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1032","id":"13659089","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2821%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2821%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1033","id":"13659889","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2821a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2821a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1034","id":"13658459","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2821b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(21b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2821b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1035","id":"13659866","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2822%5C%29ea6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(22\\)ea6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2822%29ea6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1036","id":"13659472","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2822%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2822%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1037","id":"13659086","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2822%5C%29s2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(22\\)s2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2822%29s2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1038","id":"13659573","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2822%5C%29sv1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(22\\)sv1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2822%29sv1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1039","id":"13659908","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2823%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2823%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1040","id":"13659863","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2823%5C%29sv1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(23\\)sv1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2823%29sv1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1041","id":"13659645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2823%5C%29sw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(23\\)sw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2823%29sw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1042","id":"13659461","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2823.6%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(23.6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2823.6%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1043","id":"13659445","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2823a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(23a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2823a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1044","id":"13658376","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2823f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(23f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2823f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1045","id":"13658619","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2824%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(24\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2824%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1046","id":"13658626","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2824%5C%29sv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(24\\)sv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2824%29sv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1047","id":"13659103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2824%5C%29sv1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(24\\)sv1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2824%29sv1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1048","id":"13658800","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ewa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ewa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1049","id":"13658894","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ewa1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ewa1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1050","id":"13659060","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ewa3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ewa3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1051","id":"13659864","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ewa4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ewa4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1052","id":"13659471","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1053","id":"13658893","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1054","id":"13658679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ey2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ey2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1055","id":"13659291","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ey3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ey3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1056","id":"13659861","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ez%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ez","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1057","id":"13659862","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29ez1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29ez1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1058","id":"13659460","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29fx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29fx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1059","id":"13658461","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29fy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29fy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1060","id":"13659102","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1061","id":"13658621","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1062","id":"13658857","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29s3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)s3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29s3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1063","id":"13658799","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29s4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)s4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29s4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1064","id":"13658287","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29s6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)s6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29s6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1065","id":"13659058","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1066","id":"13659059","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29seb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29seb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1067","id":"13659085","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29seb2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29seb2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1068","id":"13659910","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29seb3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29seb3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1069","id":"13658620","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29seb4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29seb4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1070","id":"13659887","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sec1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sec1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1071","id":"13658296","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sec2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sec2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1072","id":"13659063","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sed%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sed","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1073","id":"13659292","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1074","id":"13659576","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sv2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sv2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sv2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1075","id":"13658743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1076","id":"13658352","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sw3a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sw3a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sw3a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1077","id":"13659088","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sw4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sw4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1078","id":"13658741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2825%5C%29sw4a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2825%29sw4a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1079","id":"13659064","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2826%5C%29sv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(26\\)sv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2826%29sv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1080","id":"13659065","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2826%5C%29sv1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(26\\)sv1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2826%29sv1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1081","id":"13660134","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2826b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(26b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2826b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1082","id":"13660133","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2827%5C%29sbc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(27\\)sbc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2827%29sbc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1083","id":"13658859","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2827%5C%29sv1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(27\\)sv1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2827%29sv1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1084","id":"13659909","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2827b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(27b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2827b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1085","id":"13658467","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2828%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(28\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2828%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1086","id":"13658259","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2828c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(28c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2828c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1087","id":"13659462","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2829a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(29a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2829a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1088","id":"13659061","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2830%5C%29s1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(30\\)s1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2830%29s1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1089","id":"13659574","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%2831%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(31\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%2831%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1090","id":"13659104","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1091","id":"13658624","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2bc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2bc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1092","id":"13659465","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2bw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2bw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1093","id":"13659639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2bx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2bx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1094","id":"13659870","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2by%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2by","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1095","id":"13660140","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2bz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2bz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1096","id":"13658529","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ca%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ca","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1097","id":"13658469","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2cx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2cx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1098","id":"13659916","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2cy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2cy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1099","id":"13659466","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2cz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2cz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1100","id":"13658327","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2da%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2da","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1101","id":"13658897","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2dd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2dd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1102","id":"13658861","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2dx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2dx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1103","id":"13659894","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1104","id":"13659067","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2eu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2eu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2eu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1105","id":"13659895","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ew%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ew","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1106","id":"13658612","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ewa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ewa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1107","id":"13659450","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ex%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ex","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1108","id":"13659323","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1109","id":"13658692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ez%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ez","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1110","id":"13659111","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2f%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2f:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2f","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1111","id":"13660137","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2fx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2fx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1112","id":"13659917","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2fy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2fy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1113","id":"13658379","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1114","id":"13658463","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2jk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2jk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1115","id":"13659451","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2jx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2jx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2jx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1116","id":"13659871","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2mb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2mb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1117","id":"13658902","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2mc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2mc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1118","id":"13660184","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2mx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2mx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1119","id":"13658862","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2n%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2n:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2n","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1120","id":"13658385","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2pb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2pb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2pb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1121","id":"13658401","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2pi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2pi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2pi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1122","id":"13658680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1123","id":"13659872","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1124","id":"13659106","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sbc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sbc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1125","id":"13659068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1126","id":"13659094","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1127","id":"13658622","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2seb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2seb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1128","id":"13659093","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1129","id":"13659112","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1130","id":"13658752","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1131","id":"13659464","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2so%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2so","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1132","id":"13659601","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2su%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2su","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1133","id":"13658627","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1134","id":"13659069","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1135","id":"13660185","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1136","id":"13658481","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sxa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sxa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1137","id":"13658613","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sxb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sxb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1138","id":"13658863","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sxd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sxd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1139","id":"13659950","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sxe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sxe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1140","id":"13659918","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sxf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sxf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1141","id":"13658353","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1142","id":"13659602","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2sz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2sz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1143","id":"13659873","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1144","id":"13659070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2tpc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2tpc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1145","id":"13659489","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2x%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2x:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2x","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1146","id":"13659490","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1147","id":"13659919","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1148","id":"13658628","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1149","id":"13659603","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1150","id":"13659994","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1151","id":"13658494","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1152","id":"13659956","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1153","id":"13658634","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1154","id":"13658635","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1155","id":"13660017","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1156","id":"13658493","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1157","id":"13659505","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1158","id":"13658754","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1159","id":"13659148","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1160","id":"13659192","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1161","id":"13660016","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1162","id":"13658284","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1163","id":"13659648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1164","id":"13659993","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1165","id":"13659170","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1166","id":"13659955","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1167","id":"13659147","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2xz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2xz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2xz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1168","id":"13658502","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ya%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ya","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1169","id":"13660015","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1170","id":"13658811","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1171","id":"13659604","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1172","id":"13658760","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ye%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ye","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1173","id":"13659326","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1174","id":"13658753","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1175","id":"13659169","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1176","id":"13660013","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1177","id":"13659954","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1178","id":"13660189","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1179","id":"13659327","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ym%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ym","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1180","id":"13658759","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1181","id":"13658694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1182","id":"13658869","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1183","id":"13659643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1184","id":"13660012","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1185","id":"13659146","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ys%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ys","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1186","id":"13658540","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1187","id":"13659191","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1188","id":"13659992","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1189","id":"13658868","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1190","id":"13658810","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1191","id":"13659991","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1192","id":"13660011","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2yz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2yz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1193","id":"13660188","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2za%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2za","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1194","id":"13659145","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1195","id":"13659190","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1196","id":"13659144","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1197","id":"13659491","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2ze%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2ze","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1198","id":"13659504","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1199","id":"13659990","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1200","id":"13660187","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1201","id":"13658903","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1202","id":"13658501","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1203","id":"13659513","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1204","id":"13659143","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1205","id":"13659953","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1206","id":"13659989","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1207","id":"13658395","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1208","id":"13659325","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1209","id":"13658539","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2zq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2zq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1210","id":"13659193","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1211","id":"13658771","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1212","id":"13659997","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1213","id":"13659149","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29ja5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)ja5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29ja5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1214","id":"13658761","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29jk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)jk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29jk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1215","id":"13659996","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29jk1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)jk1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29jk1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1216","id":"13658695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1217","id":"13659330","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29t8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)t8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29t8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1218","id":"13659194","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xa4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xa4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xa4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1219","id":"13660018","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xa5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xa5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xa5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1220","id":"13659958","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1221","id":"13659957","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1222","id":"13659995","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xc3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xc3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1223","id":"13659172","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xc4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xc4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xc4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1224","id":"13659329","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xe3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xe3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xe3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1225","id":"13659606","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%282%5C%29xe4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(2\\)xe4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%282%29xe4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1226","id":"13658238","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%283e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(3e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%283e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1227","id":"13658876","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%283h%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(3h\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%283h%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1228","id":"13658483","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%283i%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(3i\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%283i%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1229","id":"13658755","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29eo1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)eo1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29eo1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1230","id":"13659171","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1231","id":"13658875","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29ja1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)ja1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29ja1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1232","id":"13659605","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1233","id":"13659328","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1234","id":"13659508","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1235","id":"13658697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1236","id":"13658872","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1237","id":"13659175","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29t8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)t8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29t8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1238","id":"13660025","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29tpc11a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)tpc11a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29tpc11a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1239","id":"13659965","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1240","id":"13659516","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xd1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xd1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1241","id":"13658300","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xd2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xd2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xd2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1242","id":"13658813","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xe4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xe4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xe4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1243","id":"13659612","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xg1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xg1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xg1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1244","id":"13660000","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xg2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xg2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xg2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1245","id":"13659999","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xg4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xg4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xg4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1246","id":"13659966","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xg5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xg5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xg5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1247","id":"13659153","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1248","id":"13659202","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1249","id":"13659201","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xk1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xk1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xk1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1250","id":"13658764","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xk3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xk3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xk3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1251","id":"13658641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xk4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xk4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xk4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1252","id":"13659151","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1253","id":"13659152","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%284%5C%29xq1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(4\\)xq1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%284%29xq1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1254","id":"13660023","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1255","id":"13658762","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285%5C%29b1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5\\)b1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285%29b1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1256","id":"13660024","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1257","id":"13658542","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285a%5C%29b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285a%29b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1258","id":"13658696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285a%5C%29b2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5a\\)b2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285a%29b2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1259","id":"13658642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285a%5C%29b5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5a\\)b5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285a%29b5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1260","id":"13658765","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1261","id":"13659964","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1262","id":"13658292","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1263","id":"13659199","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%285f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(5f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%285f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1264","id":"13659200","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1265","id":"13659611","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%286a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(6a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%286a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1266","id":"13660021","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%286d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(6d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%286d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1267","id":"13659962","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%286e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(6e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%286e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1268","id":"13659150","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%286f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(6f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%286f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1269","id":"13659998","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1270","id":"13658640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29ja1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)ja1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29ja1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1271","id":"13660191","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29jx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)jx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29jx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1272","id":"13659608","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1273","id":"13659198","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1274","id":"13659963","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29t8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)t8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29t8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1275","id":"13658496","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29t9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)t9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29t9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1276","id":"13658541","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29t10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)t10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29t10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1277","id":"13660022","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29t12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)t12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29t12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1278","id":"13659493","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29xi3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)xi3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29xi3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1279","id":"13659610","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29xi4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)xi4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29xi4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1280","id":"13659609","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29xi7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)xi7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29xi7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1281","id":"13658772","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29xr3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)xr3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29xr3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1282","id":"13659515","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29xr4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)xr4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29xr4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1283","id":"13659196","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287%5C%29xr6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7\\)xr6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287%29xr6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1284","id":"13659960","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%287.7%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(7.7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%287.7%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1285","id":"13658870","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1286","id":"13659174","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29ja1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)ja1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29ja1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1287","id":"13658358","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1288","id":"13659332","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29t7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)t7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29t7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1289","id":"13658871","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29t8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)t8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29t8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1290","id":"13660020","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29t9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)t9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29t9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1291","id":"13658763","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29t11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)t11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29t11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1292","id":"13658812","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29xu2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)xu2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29xu2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1293","id":"13659961","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29xy4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)xy4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29xy4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1294","id":"13659333","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29xy5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)xy5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29xy5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1295","id":"13658495","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29xy6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)xy6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29xy6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1296","id":"13659197","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29ya1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)ya1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29ya1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1297","id":"13659607","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1298","id":"13659173","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1299","id":"13658636","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1300","id":"13658507","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yg1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yg1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yg1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1301","id":"13658644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yg2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yg2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yg2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1302","id":"13659182","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yg3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yg3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yg3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1303","id":"13660197","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1304","id":"13659973","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1305","id":"13660006","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yi1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yi1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yi1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1306","id":"13659499","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%288%5C%29yi3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(8\\)yi3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%288%29yi3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1307","id":"13659974","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%289%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(9\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%289%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1308","id":"13659521","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%289a%5C%29bc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%289a%29bc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1309","id":"13659210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%289a%5C%29bc2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%289a%29bc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1310","id":"13658546","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%289a%5C%29bc6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%289a%29bc6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1311","id":"13659615","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%289a%5C%29bc7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%289a%29bc7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1312","id":"13660007","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%289d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(9d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%289d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1313","id":"13659183","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%289e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(9e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%289e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1314","id":"13659335","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2810%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(10\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2810%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1315","id":"13658228","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2810c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(10c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2810c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1316","id":"13659142","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2810d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(10d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2810d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1317","id":"13658633","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2810e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(10e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2810e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1318","id":"13659077","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1319","id":"13659076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1320","id":"13658693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1321","id":"13658538","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29t5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)t5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29t5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1322","id":"13660010","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29t6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)t6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29t6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1323","id":"13659512","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29t8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)t8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29t8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1324","id":"13658404","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29t9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)t9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29t9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1325","id":"13658279","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29xl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)xl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29xl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1326","id":"13658537","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29xl3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)xl3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29xl3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1327","id":"13659075","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1328","id":"13659875","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yf2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yf2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1329","id":"13658400","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yf3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yf3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yf3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1330","id":"13658354","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yf4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yf4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yf4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1331","id":"13659189","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1332","id":"13660186","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1333","id":"13659324","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yk1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yk1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yk1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1334","id":"13659874","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yk2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yk2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yk2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1335","id":"13659514","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1336","id":"13660014","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1337","id":"13658482","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1338","id":"13659921","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29ys%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)ys:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29ys","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1339","id":"13659188","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29ys1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)ys1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29ys1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1340","id":"13659073","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2811%5C%29yw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(11\\)yw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2811%29yw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1341","id":"13658334","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2812%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(12\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2812%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1342","id":"13659952","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2812b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(12b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2812b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1343","id":"13659074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2812e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(12e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2812e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1344","id":"13659641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2813%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(13\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2813%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1345","id":"13659951","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2813a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(13a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2813a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1346","id":"13658536","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2813a%5C%29bc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2813a%29bc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1347","id":"13659920","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2813a%5C%29bc1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2813a%29bc1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1348","id":"13659072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2813b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(13b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2813b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1349","id":"13659071","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1350","id":"13659141","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1351","id":"13658460","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1352","id":"13658809","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29t5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29t5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1353","id":"13658247","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29ym4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)ym4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29ym4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1354","id":"13658219","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1355","id":"13658326","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yq1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yq1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yq1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1356","id":"13658484","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yq3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yq3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yq3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1357","id":"13659195","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yq4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yq4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yq4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1358","id":"13659507","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1359","id":"13659492","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yt1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yt1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yt1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1360","id":"13660190","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1361","id":"13659506","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2814%5C%29yu1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(14\\)yu1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2814%29yu1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1362","id":"13658503","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2815%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(15\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2815%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1363","id":"13659331","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2815b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(15b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2815b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1364","id":"13659959","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3%5C%2816%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3\\(16\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3%2816%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1365","id":"13660019","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1366","id":"13660003","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3bc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3bc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1367","id":"13658277","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3bw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3bw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1368","id":"13658545","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3j%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3j","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1369","id":"13659158","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1370","id":"13659498","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3jea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3jea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1371","id":"13659494","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3jeb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3jeb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1372","id":"13660027","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3jec%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3jec","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1373","id":"13658815","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3jk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3jk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1374","id":"13660028","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3jx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3jx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1375","id":"13660196","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1376","id":"13658768","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3tpc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3tpc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1377","id":"13659510","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1378","id":"13660004","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1379","id":"13659614","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1380","id":"13659613","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1381","id":"13658506","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1382","id":"13659520","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1383","id":"13659159","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1384","id":"13658488","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1385","id":"13660005","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1386","id":"13658643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1387","id":"13658816","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1388","id":"13660195","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1389","id":"13659209","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1390","id":"13658505","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1391","id":"13659972","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1392","id":"13659971","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1393","id":"13658229","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1394","id":"13658544","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1395","id":"13658766","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1396","id":"13659509","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1397","id":"13659495","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1398","id":"13658487","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1399","id":"13659969","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1400","id":"13659519","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3xz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3xz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1401","id":"13659206","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3ya%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3ya","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1402","id":"13658317","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1403","id":"13659180","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1404","id":"13660001","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1405","id":"13659157","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3ye%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3ye","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1406","id":"13659968","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1407","id":"13659205","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1408","id":"13659518","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yh%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yh","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1409","id":"13660192","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1410","id":"13660194","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1411","id":"13658699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1412","id":"13659181","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1413","id":"13658343","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3ym%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3ym","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1414","id":"13658211","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1415","id":"13659970","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yq%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yq","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1416","id":"13658226","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1417","id":"13658504","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3ys%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3ys","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1418","id":"13660193","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1419","id":"13659334","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yu%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yu","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1420","id":"13658767","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1421","id":"13658302","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yx%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yx","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1422","id":"13660002","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.3yz%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.3yz","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1423","id":"13659497","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1424","id":"13659496","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1425","id":"13659208","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1426","id":"13659207","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1427","id":"13659155","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29mr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29mr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1428","id":"13658485","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29mr1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29mr1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1429","id":"13659177","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1430","id":"13659178","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1431","id":"13658814","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1432","id":"13658210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1433","id":"13659203","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1434","id":"13658250","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1435","id":"13660026","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1436","id":"13659154","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%282%5C%29xb2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%282%29xb2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1437","id":"13659204","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1438","id":"13659967","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%283%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%283%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1439","id":"13658773","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%283a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%283a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1440","id":"13659176","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%283b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%283b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1441","id":"13658497","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%283d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%283d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1442","id":"13659156","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%284%5C%29mr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%284%29mr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1443","id":"13658486","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%284%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%284%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1444","id":"13658698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%284%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%284%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1445","id":"13659179","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1446","id":"13658543","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%285b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%285b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1447","id":"13658498","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%286%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%286%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1448","id":"13658307","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%286%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%286%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1449","id":"13659517","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1450","id":"13659337","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%287a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%287a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1451","id":"13660199","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%288%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%288%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1452","id":"13659523","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4%5C%289%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4%289%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1453","id":"13659522","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4ja%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4ja","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1454","id":"13660008","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4md%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4md","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1455","id":"13659975","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4mr%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4mr","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1456","id":"13658500","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4sw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4sw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1457","id":"13659511","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1458","id":"13658237","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xa%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xa","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1459","id":"13659976","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1460","id":"13660029","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xc%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xc","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1461","id":"13660030","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xd%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xd","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1462","id":"13659336","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xe%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xe","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1463","id":"13660198","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xf%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xf","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1464","id":"13659211","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xg%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xg","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1465","id":"13659184","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1466","id":"13658489","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xk%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xk","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1467","id":"13659616","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xl%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xl","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1468","id":"13658547","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xm%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xm","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1469","id":"13658499","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xn%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xn","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1470","id":"13660009","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1471","id":"13659160","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xt%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xt","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1472","id":"13658637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xv%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xv","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1473","id":"13659185","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.4xw%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.4xw","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1474","id":"13659186","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adragonflybsd%3Adragonflybsd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:dragonflybsd:dragonflybsd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:dragonflybsd:dragonflybsd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1475","id":"13659657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adragonflybsd%3Adragonflybsd%3A1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:dragonflybsd:dragonflybsd:1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1476","id":"13659370","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adragonflybsd%3Adragonflybsd%3A1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:dragonflybsd:dragonflybsd:1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1477","id":"13660159","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adragonflybsd%3Adragonflybsd%3A1.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:dragonflybsd:dragonflybsd:1.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1478","id":"13659583","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adragonflybsd%3Adragonflybsd%3A1.10.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:dragonflybsd:dragonflybsd:1.10.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1479","id":"13658823","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1480","id":"13659597","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A0.4_1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:0.4_1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:0.4_1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1481","id":"13659647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1482","id":"13659307","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1483","id":"13659627","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A1.1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:1.1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1484","id":"13659594","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A1.1.5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:1.1.5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1485","id":"13658900","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A1.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:1.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1486","id":"13660235","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1487","id":"13659630","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1488","id":"13660173","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1489","id":"13660172","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.0.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.0.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1490","id":"13658806","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1491","id":"13659646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1492","id":"13659593","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1493","id":"13660161","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.1.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.1.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1494","id":"13660234","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.1.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.1.6.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1495","id":"13659629","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.1.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.1.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1496","id":"13658805","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.1.7.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.1.7.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1497","id":"13660171","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1498","id":"13659584","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1499","id":"13660147","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1500","id":"13658686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1501","id":"13658807","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1502","id":"13659599","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1503","id":"13658412","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1504","id":"13659628","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1505","id":"13660170","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A2.2.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:2.2.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1506","id":"13659319","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1507","id":"13659598","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1508","id":"13658336","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1509","id":"13659592","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A3.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:3.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1510","id":"13660146","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A3.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:3.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1511","id":"13660160","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:3.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1512","id":"13660233","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A3.5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:3.5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1513","id":"13659367","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1514","id":"13660168","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1515","id":"13659317","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1516","id":"13660232","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1517","id":"13659591","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.3%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.3:-:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1518","id":"13660143","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.4%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.4:-:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1519","id":"13659660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.5%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.5:-:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.5:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1520","id":"13659661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.6%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.6:-:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.6:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1521","id":"13660145","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.6.1%3Ap1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.6.1:p1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.6.1:p1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1522","id":"13659650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.6.1%3Ap10%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.6.1:p10:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.6.1:p10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1523","id":"13660155","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.6.1%3Ap4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.6.1:p4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.6.1:p4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1524","id":"13659653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.6.1%3Ap5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.6.1:p5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.6.1:p5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1525","id":"13660176","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.6.1%3Ap7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.6.1:p7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.6.1:p7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1526","id":"13659655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1527","id":"13660149","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1528","id":"13659303","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.8%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.8:-:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.8:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1529","id":"13659658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.8%3Ap2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.8:p2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.8:p2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1530","id":"13660164","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.8%3Ap6%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.8:p6:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.8:p6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1531","id":"13659654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.8%3Ap7%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.8:p7:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.8:p7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1532","id":"13659649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1533","id":"13660175","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1534","id":"13660144","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A4.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:4.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1535","id":"13658808","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1536","id":"13660162","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1537","id":"13659375","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A5.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:5.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1538","id":"13659631","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A5.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:5.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1539","id":"13658282","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A5.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:5.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1540","id":"13658687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A5.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:5.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1541","id":"13658558","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A5.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:5.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1542","id":"13658530","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:6.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1543","id":"13659308","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:6.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1544","id":"13658325","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1545","id":"13659585","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A6.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:6.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1546","id":"13658411","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1547","id":"13659302","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Afreebsd%3Afreebsd%3A7.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:freebsd:freebsd:7.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1548","id":"13660174","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1549","id":"13659652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A1.2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:1.2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1550","id":"13658241","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1551","id":"13659981","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1552","id":"13659345","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1553","id":"13659346","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1554","id":"13659531","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1555","id":"13660036","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1556","id":"13658757","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1557","id":"13658781","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1558","id":"13658758","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1559","id":"13659502","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1560","id":"13660038","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1561","id":"13658509","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.9.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.9.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1562","id":"13658294","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1563","id":"13659982","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1564","id":"13658778","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1565","id":"13659983","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1566","id":"13659526","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1567","id":"13658702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1568","id":"13658779","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1569","id":"13659528","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1570","id":"13659527","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1571","id":"13658230","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1572","id":"13659984","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1573","id":"13658262","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1574","id":"13659347","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1575","id":"13660207","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1576","id":"13658270","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1577","id":"13658549","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1578","id":"13659985","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1579","id":"13659216","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1580","id":"13658341","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1581","id":"13659225","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1582","id":"13659348","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1583","id":"13658224","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.31%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.31","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1584","id":"13658492","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.32%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1585","id":"13659166","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.33%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.33","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1586","id":"13660051","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1587","id":"13658780","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1588","id":"13660208","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.36%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.36","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1589","id":"13659622","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.37%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.37","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1590","id":"13658508","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.38%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.38","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1591","id":"13660037","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.0.39%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.0.39","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1592","id":"13659167","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1593","id":"13658703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.1.89%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.1.89","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1594","id":"13659532","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.1.132%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.1.132:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.1.132","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1595","id":"13658905","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1596","id":"13658651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1597","id":"13659226","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1598","id":"13658775","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1599","id":"13658653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1600","id":"13659988","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1601","id":"13658882","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1602","id":"13658654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1603","id":"13659350","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1604","id":"13659351","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1605","id":"13660039","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1606","id":"13658258","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1607","id":"13659986","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1608","id":"13659217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1609","id":"13658550","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1610","id":"13660052","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1611","id":"13660053","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1612","id":"13659168","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1613","id":"13660209","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1614","id":"13658652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1615","id":"13659533","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1616","id":"13659987","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1617","id":"13658348","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1618","id":"13658906","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1619","id":"13659503","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1620","id":"13660210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1621","id":"13659349","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1622","id":"13658819","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.2.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.2.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1623","id":"13659656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1624","id":"13658880","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1625","id":"13659252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1626","id":"13659229","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1627","id":"13659222","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1628","id":"13658783","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1629","id":"13659352","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1630","id":"13659623","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1631","id":"13658655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1632","id":"13658657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1633","id":"13660055","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1634","id":"13659253","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1635","id":"13658233","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1636","id":"13660058","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1637","id":"13658370","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1638","id":"13658375","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1639","id":"13659355","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1640","id":"13660211","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1641","id":"13660043","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1642","id":"13660082","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1643","id":"13658213","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1644","id":"13660067","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1645","id":"13658281","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1646","id":"13659624","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1647","id":"13659625","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1648","id":"13659228","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1649","id":"13660042","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1650","id":"13658665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1651","id":"13658784","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1652","id":"13658552","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1653","id":"13659240","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1654","id":"13659354","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.31%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.31:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.31","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1655","id":"13658222","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.32%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.32:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1656","id":"13660041","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.33%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.33:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.33","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1657","id":"13658664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1658","id":"13660057","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1659","id":"13660066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.36%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.36:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.36","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1660","id":"13658295","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.37%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.37:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.37","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1661","id":"13658551","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.38%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.38:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.38","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1662","id":"13658367","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.39%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.39:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.39","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1663","id":"13658782","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.40%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.40:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.40","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1664","id":"13659221","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.41%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.41:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.41","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1665","id":"13660040","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.42%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.42:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.42","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1666","id":"13658704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.43%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.43:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.43","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1667","id":"13659220","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.44%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.44:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.44","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1668","id":"13659227","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.45%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.45:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.45","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1669","id":"13659353","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.46%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.46:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.46","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1670","id":"13660056","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.47%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.47:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.47","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1671","id":"13660054","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.48%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.48:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.48","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1672","id":"13659529","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.49%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.49:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.49","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1673","id":"13659534","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.50%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.50:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.50","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1674","id":"13658647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.51%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.51:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.51","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1675","id":"13658656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.3.99%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.3.99","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1676","id":"13659219","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1677","id":"13659218","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1678","id":"13660068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1679","id":"13659245","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1680","id":"13660073","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1681","id":"13660214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1682","id":"13660213","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1683","id":"13660085","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1684","id":"13659254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1685","id":"13659536","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1686","id":"13659233","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1687","id":"13659241","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1688","id":"13658363","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1689","id":"13658705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1690","id":"13658668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1691","id":"13659542","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1692","id":"13658243","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1693","id":"13659626","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1694","id":"13658820","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1695","id":"13660083","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1696","id":"13659545","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1697","id":"13660060","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1698","id":"13658785","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1699","id":"13660088","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1700","id":"13658907","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1701","id":"13659235","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1702","id":"13659256","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1703","id":"13658555","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1704","id":"13660217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1705","id":"13659255","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1706","id":"13660087","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1707","id":"13659243","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.31%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.31","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1708","id":"13660072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.32%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1709","id":"13658554","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.33%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.33","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1710","id":"13659244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.33.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.33.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1711","id":"13658821","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.33.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.33.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1712","id":"13659544","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.33.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.33.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1713","id":"13660086","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.33.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.33.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1714","id":"13660216","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1715","id":"13659234","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.34.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.34.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1716","id":"13659537","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.34.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.34.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1717","id":"13660071","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1718","id":"13659543","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.4.35.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.4.35.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1719","id":"13658323","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1720","id":"13658399","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1721","id":"13659356","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1722","id":"13658789","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1723","id":"13658335","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1724","id":"13660074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1725","id":"13659247","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1726","id":"13660063","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1727","id":"13659548","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1728","id":"13659549","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1729","id":"13660220","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1730","id":"13660215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1731","id":"13659551","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1732","id":"13658344","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1733","id":"13658510","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1734","id":"13658553","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1735","id":"13660070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1736","id":"13658786","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1737","id":"13658658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1738","id":"13660059","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1739","id":"13659231","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1740","id":"13658338","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1741","id":"13658371","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1742","id":"13659242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1743","id":"13658787","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1744","id":"13658659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1745","id":"13659232","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1746","id":"13660084","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1747","id":"13658670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1748","id":"13660212","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1749","id":"13658263","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1750","id":"13658885","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.31%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.31","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1751","id":"13660069","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.32%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1752","id":"13659230","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.33%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.33","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1753","id":"13659535","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1754","id":"13658669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1755","id":"13658515","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.36%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.36","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1756","id":"13660089","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.37%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.37","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1757","id":"13660061","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.38%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.38","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1758","id":"13660218","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.39%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.39","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1759","id":"13658790","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.40%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.40","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1760","id":"13658368","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.41%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.41","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1761","id":"13659546","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.42%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.42","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1762","id":"13659547","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.43%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.43","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1763","id":"13660092","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.44%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.44","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1764","id":"13660221","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.45%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.45","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1765","id":"13659237","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.46%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.46","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1766","id":"13659553","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.47%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.47","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1767","id":"13658513","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.48%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.48","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1768","id":"13658883","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.49%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.49","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1769","id":"13660222","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.50%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.50","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1770","id":"13660093","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.51%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.51","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1771","id":"13658556","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.52%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.52","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1772","id":"13659538","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.53%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.53","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1773","id":"13660094","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.54%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.54","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1774","id":"13658313","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.55%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.55","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1775","id":"13659238","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.56%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.56","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1776","id":"13659358","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.57%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.57","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1777","id":"13660075","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.58%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.58","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1778","id":"13660090","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.59%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.59","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1779","id":"13659552","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.60%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.60","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1780","id":"13659236","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.61%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.61","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1781","id":"13659246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.62%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.62","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1782","id":"13658512","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.63%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.63","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1783","id":"13660219","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.64%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.64","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1784","id":"13658706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.65%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.65","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1785","id":"13658672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.66%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.66","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1786","id":"13660091","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.67%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.67","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1787","id":"13658661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.68%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.68","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1788","id":"13658331","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.5.69%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.5.69","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1789","id":"13660064","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1790","id":"13659357","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1791","id":"13658393","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1792","id":"13658881","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1793","id":"13658639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1794","id":"13658777","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1795","id":"13658357","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1796","id":"13660205","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1797","id":"13659980","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1798","id":"13659165","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1799","id":"13660203","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.8.1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.8.1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1800","id":"13658879","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1801","id":"13660035","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1802","id":"13658660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1803","id":"13658266","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1804","id":"13660062","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1805","id":"13658347","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1806","id":"13659539","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1807","id":"13660076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1808","id":"13658791","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1809","id":"13658662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1810","id":"13660225","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1811","id":"13658516","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1812","id":"13659248","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1813","id":"13658377","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1814","id":"13658671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.11.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.11.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1815","id":"13660077","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1816","id":"13660224","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1817","id":"13659359","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1818","id":"13659249","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1819","id":"13659541","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1820","id":"13659540","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1821","id":"13659257","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1822","id":"13660095","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1823","id":"13658333","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.12.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.12.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1824","id":"13660078","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1825","id":"13658557","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1826","id":"13660223","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1827","id":"13658886","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1828","id":"13658514","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1829","id":"13659361","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.13.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.13.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1830","id":"13659258","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1831","id":"13658674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1832","id":"13659360","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1833","id":"13660096","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1834","id":"13658673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1835","id":"13658663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1836","id":"13658884","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1837","id":"13659239","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.14.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.14.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1838","id":"13658511","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1839","id":"13660079","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1840","id":"13658788","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1841","id":"13659554","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1842","id":"13658361","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1843","id":"13660065","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1844","id":"13660097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1845","id":"13658803","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1846","id":"13659305","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.15.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.15.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1847","id":"13659250","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1848","id":"13659557","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1849","id":"13658802","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1850","id":"13660230","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1851","id":"13659251","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1852","id":"13658675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1853","id":"13660228","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1854","id":"13658407","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1855","id":"13660227","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1856","id":"13658518","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1857","id":"13658314","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1858","id":"13659579","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1859","id":"13659365","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1860","id":"13660099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1861","id":"13658685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1862","id":"13659364","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1863","id":"13658804","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1864","id":"13658285","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1865","id":"13660167","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1866","id":"13658690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1867","id":"13660231","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1868","id":"13660154","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1869","id":"13659306","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1870","id":"13659589","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1871","id":"13659300","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.24%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.24","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1872","id":"13659580","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.25%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.25","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1873","id":"13659315","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.26%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.26","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1874","id":"13659316","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.27%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.27","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1875","id":"13660229","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.28%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.28","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1876","id":"13659366","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1877","id":"13659590","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.30%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.30","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1878","id":"13660080","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.31%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.31","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1879","id":"13659362","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.32%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.32","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1880","id":"13658908","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.33%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.33","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1881","id":"13659259","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.34%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.34","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1882","id":"13658517","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.35%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.35","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1883","id":"13660142","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.36%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.36","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1884","id":"13659298","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.37%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.37","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1885","id":"13658666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.38%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.38","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1886","id":"13660226","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.39%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.39","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1887","id":"13658304","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.40%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.40","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1888","id":"13659555","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.41%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.41","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1889","id":"13659578","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.43%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.43","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1890","id":"13658398","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.44%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.44","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1891","id":"13660141","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.45%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.45","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1892","id":"13658683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.46%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.46","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1893","id":"13659299","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.47%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.47","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1894","id":"13659588","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.48%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.48","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1895","id":"13658667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.49%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.49","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1896","id":"13659363","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.50%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.50","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1897","id":"13660098","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.51%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.51","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1898","id":"13659556","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.52%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.52","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1899","id":"13659550","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.16.53%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.16.53","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1900","id":"13660081","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1901","id":"13659224","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1902","id":"13659339","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1903","id":"13658491","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1904","id":"13658646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1905","id":"13658645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1906","id":"13658904","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1907","id":"13660046","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1908","id":"13660048","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1909","id":"13658648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1910","id":"13658330","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1911","id":"13659338","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1912","id":"13659530","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1913","id":"13658291","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1914","id":"13660047","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.17.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.17.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1915","id":"13658638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1916","id":"13659979","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1917","id":"13659163","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1918","id":"13658877","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1919","id":"13659213","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1920","id":"13658700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1921","id":"13658818","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1922","id":"13658873","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1923","id":"13659977","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1924","id":"13658288","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.18.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.18.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1925","id":"13659342","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1926","id":"13659619","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1927","id":"13658769","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1928","id":"13659161","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1929","id":"13658770","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.19.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.19.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1930","id":"13658756","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1931","id":"13659187","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1932","id":"13660201","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1933","id":"13660202","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1934","id":"13659617","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1935","id":"13660032","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1936","id":"13658774","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1937","id":"13658221","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1938","id":"13659978","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1939","id":"13659223","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1940","id":"13658246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1941","id":"13659525","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1942","id":"13659501","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1943","id":"13659162","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1944","id":"13658490","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1945","id":"13660045","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.20.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.20.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1946","id":"13659214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1947","id":"13658312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1948","id":"13658878","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1949","id":"13660034","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1950","id":"13659620","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.21.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.21.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1951","id":"13659343","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1952","id":"13658776","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1953","id":"13658649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1954","id":"13659341","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1955","id":"13658548","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1956","id":"13660033","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1957","id":"13659340","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1958","id":"13659164","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.22.16%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.22.16","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1959","id":"13660049","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1960","id":"13659618","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1961","id":"13658874","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1962","id":"13659644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1963","id":"13659215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1964","id":"13658275","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1965","id":"13660050","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1966","id":"13660206","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1967","id":"13658701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1968","id":"13659344","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.23.14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.23.14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1969","id":"13659621","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.24:rc2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1970","id":"13660204","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Alinux%3Alinux_kernel%3A2.6.24%3Arc3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:linux:linux_kernel:2.6.24:rc3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1971","id":"13658650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amidnightbsd%3Amidnightbsd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:midnightbsd:midnightbsd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:midnightbsd:midnightbsd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1972","id":"13659662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1973","id":"13659651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1974","id":"13659372","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1975","id":"13659595","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1976","id":"13660237","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1977","id":"13658707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1978","id":"13658531","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1979","id":"13658688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1980","id":"13660163","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.3.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.3.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1981","id":"13659371","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1982","id":"13660236","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1983","id":"13660148","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1984","id":"13659309","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.4.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1985","id":"13659586","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1986","id":"13658534","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1987","id":"13659373","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.5.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.5.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1988","id":"13659632","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.5.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.5.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1989","id":"13658272","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1990","id":"13658345","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.6.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1991","id":"13658899","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A1.6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:1.6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1992","id":"13659321","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1993","id":"13660179","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A2.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:2.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1994","id":"13659633","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A2.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:2.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1995","id":"13658909","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A2.0.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:2.0.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1996","id":"13659304","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A2.0.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:2.0.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1997","id":"13658254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1998","id":"13658691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A2.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:2.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1999","id":"13659320","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2000","id":"13660150","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A3.0.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:3.0.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2001","id":"13659310","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A3.0.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:3.0.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2002","id":"13659311","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2003","id":"13660165","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A3.99.15%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:3.99.15:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:3.99.15","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2004","id":"13658535","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Anetbsd%3Anetbsd%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:netbsd:netbsd:4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2005","id":"13658532","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2006","id":"13660151","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2007","id":"13659312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2008","id":"13659313","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2009","id":"13659374","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2010","id":"13660180","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2011","id":"13659600","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2012","id":"13660152","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2013","id":"13660183","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2014","id":"13659322","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2015","id":"13658359","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A2.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:2.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2016","id":"13658824","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2017","id":"13660238","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2018","id":"13658689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2019","id":"13659596","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2020","id":"13658684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2021","id":"13660153","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2022","id":"13660182","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2023","id":"13660181","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2024","id":"13658318","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2025","id":"13658409","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A3.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:3.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2026","id":"13659314","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2027","id":"13660166","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2028","id":"13658299","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2029","id":"13659587","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aopenbsd%3Aopenbsd%3A4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:openbsd:openbsd:4.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2030","id":"13660178","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Atrustedbsd%3Atrustedbsd%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:trustedbsd:trustedbsd:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:trustedbsd:trustedbsd:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2031","id":"13660177","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":8,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_2000%3A-%3Asp4%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_2000:-:sp4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0","id":"13660239","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_server_2003%3A-%3Asp2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_server_2003:-:sp2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1","id":"13660242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_server_2008%3A-%3Asp1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_server_2008:-:sp1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-2","id":"13660245","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_server_2008%3A-%3Asp2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_server_2008:-:sp2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-3","id":"13660246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_vista%3A-%3Asp1%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_vista:-:sp1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-4","id":"13660243","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_vista%3A-%3Asp2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_vista:-:sp2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-5","id":"13660244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_xp%3A-%3Asp2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_xp:-:sp2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-6","id":"13660240","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Amicrosoft%3Awindows_xp%3A-%3Asp3%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*","cpe22Uri":"cpe:/o:microsoft:windows_xp:-:sp3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-7","id":"13660241","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Acatalyst_blade_switch_3020_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:catalyst_blade_switch_3020_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:catalyst_blade_switch_3020_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"13660247","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.2\\(50\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.2\\(50\\)","rangeId":"535623","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Acatalyst_blade_switch_3020%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:catalyst_blade_switch_3020:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"13660252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Acatalyst_blade_switch_3120_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:catalyst_blade_switch_3120_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:catalyst_blade_switch_3120_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"13660250","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.2\\(50\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.2\\(50\\)","rangeId":"535622","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Acatalyst_blade_switch_3120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:catalyst_blade_switch_3120:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"13660251","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Acatalyst_blade_switch_3120x_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:catalyst_blade_switch_3120x_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:catalyst_blade_switch_3120x_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"13660248","matchCpes":[],"rangeDescription":" versions up to (excluding) 12.2\\(50\\) ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"12.2\\(50\\)","rangeId":"535624","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Acatalyst_blade_switch_3120x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:catalyst_blade_switch_3120x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"13660249","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":3,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aoracle%3Asolaris%3A8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:oracle:solaris:8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0","id":"13660253","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aoracle%3Asolaris%3A9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:oracle:solaris:9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1","id":"13660254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aoracle%3Asolaris%3A10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:oracle:solaris:10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-2","id":"13660255","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 44 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/20/2024 7:52:05 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://blog.robertlee.name/2008/10/conjecture-speculation.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://insecure.org/stf/tcp-dos-attack-explained.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://marc.info/?l=bugtraq&m=125856010926699&w=2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://marc.info/?l=bugtraq&m=125856010926699&w=2</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDVSA-2013:150</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.outpost24.com/news/news-2008-10-02.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.us-cert.gov/cas/techalerts/TA09-251A.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by MITRE</span> <span
|
||
data-testid="vuln-change-history-date-1">5/13/2024 9:57:41 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-2">12/14/2022 11:40:36 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
>Record truncated, showing 500 of 135456 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2008-4609/change-record?changeRecordedOn=12/14/2022T11:40:36.487-0500">View Entire Change Record</a><br/>
|
||
<pre>OR
|
||
*cpe:2.3:o:bsd:bsd:*:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*
|
||
*cpe:2.3</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 106594 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2008-4609/change-record?changeRecordedOn=12/14/2022T11:40:36.487-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:o:bsd:bsd:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*
|
||
*cpe:2.3</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:catalyst_blade_switch_3020_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.2\(50\)
|
||
OR
|
||
cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:catalyst_blade_switch_3120_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.2\(50\)
|
||
OR
|
||
cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:catalyst_blade_switch_3120x_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.2\(50\)
|
||
OR
|
||
cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
|
||
*cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
|
||
*cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*
|
||
*cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
|
||
*cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
|
||
*cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
|
||
*cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
|
||
*cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://blog.robertlee.name/2008/10/conjecture-speculation.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://blog.robertlee.name/2008/10/conjecture-speculation.html Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://insecure.org/stf/tcp-dos-attack-explained.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://insecure.org/stf/tcp-dos-attack-explained.html Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://marc.info/?l=bugtraq&m=125856010926699&w=2 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://marc.info/?l=bugtraq&m=125856010926699&w=2 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.cpni.gov.uk/Docs/tn-03-09-security-assessment-TCP.pdf Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.outpost24.com/news/news-2008-10-02.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.outpost24.com/news/news-2008-10-02.html Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.us-cert.gov/cas/techalerts/TA09-251A.html US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.us-cert.gov/cas/techalerts/TA09-251A.html Third Party Advisory, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340 Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html Broken Link</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Evaluator Description</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Please see also:
|
||
http://blog.robertlee.name/2008/10/more-detailed-response-to-gordons-post.html
|
||
|
||
and
|
||
|
||
http://www.curbrisk.com/security-blog/robert-e-lee-discusses-tcp-denial-service-vulnerability-sc-magazine.html
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">Please see also:
|
||
http://blog.robertlee.name/2008/10/more-detailed-response-to-gordons-post.html
|
||
|
||
and
|
||
|
||
http://www.curbrisk.com/security-blog/robert-e-lee-discusses-tcp-denial-service-vulnerability-sc-magazine.html
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-3">7/07/2021 12:10:03 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp2:storage:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-4">7/07/2021 12:09:11 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp1:enterprise:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-5">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-5">7/07/2021 12:09:17 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp2:enterprise:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-6">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-6">7/07/2021 12:09:20 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:gold:datacenter:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-7">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-7">7/07/2021 12:09:26 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp1:datacenter:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-8">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-8">7/07/2021 12:09:32 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp2:datacenter:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-9">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-9">7/07/2021 12:09:50 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:gold:storage:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-10">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-10">7/07/2021 12:09:55 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp1:storage:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-11">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-11">7/07/2021 12:08:33 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-11">
|
||
<td
|
||
data-testid="vuln-change-history-11-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-11-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-11-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp1:standard:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-11-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-12">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-12">7/07/2021 12:08:36 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-12">
|
||
<td
|
||
data-testid="vuln-change-history-12-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-12-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-12-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:sp2:standard:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-12-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-13">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-13">7/07/2021 12:08:38 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:gold:standard:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-14">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-14">7/07/2021 12:08:44 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:gold:x64-standard:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-15">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-15">7/07/2021 12:08:55 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-15">
|
||
<td
|
||
data-testid="vuln-change-history-15-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-15-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-15-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:gold:x64-enterprise:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-15-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-16">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-16">7/07/2021 12:08:58 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2003_server:*:gold:x64-datacenter:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_server_2003:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-17">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-17">4/30/2019 10:27:08 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:gold:advanced_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-18">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-18">4/30/2019 10:27:08 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-18">
|
||
<td
|
||
data-testid="vuln-change-history-18-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-18-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-18-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:gold:datacenter_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-18-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-19">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-19">4/30/2019 10:27:09 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-19">
|
||
<td
|
||
data-testid="vuln-change-history-19-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-19-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-19-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:gold:professional:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-19-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:-:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-20">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-20">4/30/2019 10:27:09 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:advanced_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-21">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-21">4/30/2019 10:27:10 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-21">
|
||
<td
|
||
data-testid="vuln-change-history-21-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-21-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-21-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:datacenter_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-21-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-22">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-22">4/30/2019 10:27:10 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-22">
|
||
<td
|
||
data-testid="vuln-change-history-22-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-22-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-22-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:professional:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-22-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-23">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-23">4/30/2019 10:27:10 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-23">
|
||
<td
|
||
data-testid="vuln-change-history-23-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-23-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-23-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-23-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-24">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-24">4/30/2019 10:27:10 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-24">
|
||
<td
|
||
data-testid="vuln-change-history-24-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-24-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-24-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:advanced_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-24-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-25">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-25">4/30/2019 10:27:11 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-25">
|
||
<td
|
||
data-testid="vuln-change-history-25-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-25-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-25-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:datacenter_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-25-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-26">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-26">4/30/2019 10:27:11 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-26">
|
||
<td
|
||
data-testid="vuln-change-history-26-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-26-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-26-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:professional:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-26-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-27">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-27">4/30/2019 10:27:11 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-27">
|
||
<td
|
||
data-testid="vuln-change-history-27-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-27-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-27-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-27-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-28">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-28">4/30/2019 10:27:11 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-28">
|
||
<td
|
||
data-testid="vuln-change-history-28-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-28-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-28-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:advanced_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-28-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-29">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-29">4/30/2019 10:27:12 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-29">
|
||
<td
|
||
data-testid="vuln-change-history-29-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-29-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-29-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:datacenter_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-29-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-30">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-30">4/30/2019 10:27:12 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-30">
|
||
<td
|
||
data-testid="vuln-change-history-30-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-30-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-30-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:professional:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-30-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-31">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-31">4/30/2019 10:27:12 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-31">
|
||
<td
|
||
data-testid="vuln-change-history-31-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-31-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-31-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-31-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-32">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-32">4/30/2019 10:27:12 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-32">
|
||
<td
|
||
data-testid="vuln-change-history-32-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-32-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-32-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:advanced_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-32-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-33">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-33">4/30/2019 10:27:13 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-33">
|
||
<td
|
||
data-testid="vuln-change-history-33-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-33-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-33-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:datacenter_server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-33-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-34">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-34">4/30/2019 10:27:13 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-34">
|
||
<td
|
||
data-testid="vuln-change-history-34-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-34-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-34-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:professional:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-34-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-35">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-35">4/30/2019 10:27:14 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-35">
|
||
<td
|
||
data-testid="vuln-change-history-35-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-35-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-35-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:server:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-35-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-36">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-36">4/30/2019 8:34:27 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-36">
|
||
<td
|
||
data-testid="vuln-change-history-36-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-36-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-36-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_vista:*:*:x64-enterprise:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-36-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-37">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-37">4/30/2019 8:34:27 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-37">
|
||
<td
|
||
data-testid="vuln-change-history-37-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-37-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-37-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_vista:*:*:x64-home_premium:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-37-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-38">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-38">4/30/2019 8:34:27 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-38">
|
||
<td
|
||
data-testid="vuln-change-history-38-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-38-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-38-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_vista:*:*:x64-ultimate:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-38-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-39">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-39">10/30/2018 12:26:20 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-39">
|
||
<td
|
||
data-testid="vuln-change-history-39-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-39-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-39-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.9:final:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-39-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-40">CPE Deprecation Remap by NIST</span> <span
|
||
data-testid="vuln-change-history-date-40">10/30/2018 12:25:10 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-40">
|
||
<td
|
||
data-testid="vuln-change-history-40-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-40-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-40-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.19.0:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-40-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-41">CVE Modified by MITRE</span> <span
|
||
data-testid="vuln-change-history-date-41">10/12/2018 5:48:56 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-41">
|
||
<td
|
||
data-testid="vuln-change-history-41-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-41-type">Reference</td>
|
||
<td data-testid="vuln-change-history-41-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-41-new">
|
||
|
||
<pre style="word-break: break-all !important">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-41">
|
||
<td
|
||
data-testid="vuln-change-history-41-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-41-type">Reference</td>
|
||
<td data-testid="vuln-change-history-41-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-41-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-42">CVE Modified by MITRE</span> <span
|
||
data-testid="vuln-change-history-date-42">9/28/2017 9:32:14 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-42">
|
||
<td
|
||
data-testid="vuln-change-history-42-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-42-type">Reference</td>
|
||
<td data-testid="vuln-change-history-42-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-42-new">
|
||
|
||
<pre style="word-break: break-all !important">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6340 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-42">
|
||
<td
|
||
data-testid="vuln-change-history-42-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-42-type">Reference</td>
|
||
<td data-testid="vuln-change-history-42-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6340 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-42-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-43">Initial CVE Analysis</span> <span
|
||
data-testid="vuln-change-history-date-43">10/20/2008 3:38:00 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2008-4609">CVE-2008-4609</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">10/20/2008</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/20/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">MITRE</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="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" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|