2566 lines
358 KiB
Text
2566 lines
358 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2020-10136</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: false,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2020-10136</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Current Description </h3>
|
||
<p data-testid="vuln-description">IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.</p><br/>
|
||
|
||
|
||
|
||
<p>
|
||
<a href="#vulnCurrentDescriptionTitle"
|
||
style="text-decoration: underline" id="showVulnAnalysis"><i
|
||
class="fa fa-plus"></i>View Analysis Description</a>
|
||
</p>
|
||
<div id="vulnAnalysisDescription" style="display: none;">
|
||
<h3 data-testid="vuln-analysis-description-title">Analysis
|
||
Description</h3>
|
||
<p data-testid="vuln-analysis-description">Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access control bypass, and other unexpected network behaviors.</p>
|
||
</div>
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-10136&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-warning">5.3 MEDIUM</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>5.3 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 1.4 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 3.9 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> None </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> None </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> Low </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-10136&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&version=2.0&source=NIST" class="label label-warning">5.0 MEDIUM</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:N/AC:L/Au:N/C:N/I:N/A:P)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>5.0 </span><span data-testid='vuln-cvssv2-base-score-severity'>MEDIUM</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:N/AC:L/Au:N/C:N/I:N/A:P)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>2.9</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>10.0</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Network</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Low</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>None</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>None</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>Partial</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows disruption of service<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="https://datatracker.ietf.org/doc/html/rfc6169"
|
||
target="_blank" rel="noopener noreferrer">https://datatracker.ietf.org/doc/html/rfc6169</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="https://datatracker.ietf.org/doc/html/rfc6169"
|
||
target="_blank" rel="noopener noreferrer">https://datatracker.ietf.org/doc/html/rfc6169</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="https://kb.cert.org/vuls/id/636397/"
|
||
target="_blank" rel="noopener noreferrer">https://kb.cert.org/vuls/id/636397/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="https://kb.cert.org/vuls/id/636397/"
|
||
target="_blank" rel="noopener noreferrer">https://kb.cert.org/vuls/id/636397/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-4">
|
||
<td data-testid="vuln-hyperlinks-link-4">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-4">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-5">
|
||
<td data-testid="vuln-hyperlinks-link-5">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-5">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-6">
|
||
<td data-testid="vuln-hyperlinks-link-6">
|
||
<a
|
||
href="https://www.digi.com/resources/security"
|
||
target="_blank" rel="noopener noreferrer">https://www.digi.com/resources/security</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-6">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-7">
|
||
<td data-testid="vuln-hyperlinks-link-7">
|
||
<a
|
||
href="https://www.digi.com/resources/security"
|
||
target="_blank" rel="noopener noreferrer">https://www.digi.com/resources/security</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-7">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-8">
|
||
<td data-testid="vuln-hyperlinks-link-8">
|
||
<a
|
||
href="https://www.kb.cert.org/vuls/id/636397"
|
||
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/636397</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-8">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-9">
|
||
<td data-testid="vuln-hyperlinks-link-9">
|
||
<a
|
||
href="https://www.kb.cert.org/vuls/id/636397"
|
||
target="_blank" rel="noopener noreferrer">https://www.kb.cert.org/vuls/id/636397</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-9">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">US Government Resource</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/290.html" target="_blank" rel="noopener noreferrer">CWE-290</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Authentication Bypass by Spoofing</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-0-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>CERT/CC </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2020-10136"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":41,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_1000v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_1000v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-0","id":"14967850","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_1000ve%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_1000ve:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_1000ve:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-1","id":"14967851","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sk3%5C%281.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(1.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sk3%281.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-0","id":"14967889","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sk3%5C%282.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sk3%282.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-1","id":"14967888","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sk3%5C%282.1a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sk3%282.1a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-2","id":"14967887","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sk3%5C%282.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sk3%282.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-3","id":"14967886","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sk3%5C%282.2b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sk3%282.2b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-4","id":"14967885","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm1%5C%285.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm1%285.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-5","id":"14967853","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm1%5C%285.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm1%285.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-6","id":"14967884","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm1%5C%285.2a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm1%285.2a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-7","id":"14967883","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm1%5C%285.2b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm1%285.2b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-8","id":"14967882","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm1%5C%285.2c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm1%285.2c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-9","id":"14967881","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm3%5C%281.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm3%281.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-10","id":"14967880","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm3%5C%281.1a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm3%281.1a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-11","id":"14967879","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm3%5C%281.1b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm3%281.1b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-12","id":"14967878","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm3%5C%281.1c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm3%281.1c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-13","id":"14967877","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sm3%5C%282.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sm3%282.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-14","id":"14967876","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-15","id":"14967857","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-16","id":"14967874","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.3%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.3%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-17","id":"14967855","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.4%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.4%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-18","id":"14967858","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.4b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.4b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-19","id":"14967873","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.5a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.5a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-20","id":"14967854","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.5b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.5b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-21","id":"14967852","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.6%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.6%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-22","id":"14967856","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.10%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.10\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.10%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-23","id":"14967859","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%281.15%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.15\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%281.15%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-24","id":"14967875","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%282.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%282.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-25","id":"14967890","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%282.5%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%282.5%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-26","id":"14967872","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%282.8%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%282.8%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-27","id":"14967860","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%283.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%283.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-28","id":"14967871","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%283.15%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.15\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%283.15%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-29","id":"14967870","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-30","id":"14967869","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-31","id":"14967868","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-32","id":"14967867","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1b%5C%29%3A*%3A*%3A*%3A*%3Ahyper-v%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:hyper-v:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1b%29::~~~hyper-v~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-33","id":"14967863","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1b%5C%29%3A*%3A*%3A*%3A*%3Avsphere%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:vsphere:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1b%29::~~~vsphere~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-34","id":"14967861","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv5%5C%281.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv5%281.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-35","id":"14967866","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv5%5C%281.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv5%281.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-36","id":"14967865","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv5%5C%281.3%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv5%281.3%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-37","id":"14967864","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv5%5C%281.3%5C%29%3A*%3A*%3A*%3A*%3Avsphere%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:vsphere:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv5%281.3%29::~~~vsphere~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-38","id":"14967862","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":90,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_3016%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_3016:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"14967761","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_3048%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_3048:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-1","id":"14967763","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_3064%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_3064:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-2","id":"14967762","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_3064-t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_3064-t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-3","id":"14967765","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_3132q%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_3132q:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-4","id":"14967764","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_3172%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_3172:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-5","id":"14967760","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29a1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29a1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"14967849","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29a1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29a1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-1","id":"14967848","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29a1%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29a1%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-2","id":"14967847","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-3","id":"14967804","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-4","id":"14967802","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-5","id":"14967814","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u1%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u1%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-6","id":"14967846","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u1%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u1%281d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-7","id":"14967794","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-8","id":"14967788","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u1%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u1%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-9","id":"14967791","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u2%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-10","id":"14967815","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u2%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u2%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-11","id":"14967780","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u2%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u2%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-12","id":"14967809","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u2%5C%282b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u2%282b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-13","id":"14967778","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u2%5C%282c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u2%282c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-14","id":"14967805","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u2%5C%282d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u2%282d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-15","id":"14967799","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-16","id":"14967776","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u3%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u3%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-17","id":"14967797","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u3%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u3%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-18","id":"14967771","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u3%5C%282b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u3%282b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-19","id":"14967813","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u4\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u4%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-20","id":"14967767","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-21","id":"14967807","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-22","id":"14967783","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-23","id":"14967795","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-24","id":"14967782","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-25","id":"14967806","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-26","id":"14967768","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-27","id":"14967787","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281g%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281g%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-28","id":"14967798","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281h%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281h%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-29","id":"14967772","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281i%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1i\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281i%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-30","id":"14967845","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.0%5C%283%5C%29u5%5C%281j%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1j\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.0%283%29u5%281j%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-31","id":"14967844","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-32","id":"14967843","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-33","id":"14967842","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-34","id":"14967841","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-35","id":"14967840","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%281d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-36","id":"14967839","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%281e%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1e\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%281e%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-37","id":"14967838","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%281f%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1f\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%281f%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-38","id":"14967837","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a1%5C%282d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(2d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a1%282d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-39","id":"14967836","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-40","id":"14967835","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a3%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a3%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-41","id":"14967834","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a3%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a3%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-42","id":"14967833","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a4%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-43","id":"14967820","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a4%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a4%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-44","id":"14967821","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a4%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a4%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-45","id":"14967822","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a4%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a4%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-46","id":"14967823","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a4%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a4%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-47","id":"14967824","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29a4%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29a4%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-48","id":"14967825","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-49","id":"14967779","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-50","id":"14967801","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-51","id":"14967769","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u1%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u1%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-52","id":"14967808","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u1%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u1%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-53","id":"14967810","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u2%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-54","id":"14967775","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u2%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u2%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-55","id":"14967781","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u2%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u2%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-56","id":"14967800","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u2%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u2%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-57","id":"14967789","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u2%5C%284.92.4z%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4.92.4z\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u2%284.92.4z%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-58","id":"14967819","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u2%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u2%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-59","id":"14967817","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u2%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u2%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-60","id":"14967818","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-61","id":"14967784","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-62","id":"14967774","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-63","id":"14967796","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-64","id":"14967811","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-65","id":"14967803","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-66","id":"14967832","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-67","id":"14967831","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%288%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%288%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-68","id":"14967830","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u3%5C%289%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(9\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u3%289%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-69","id":"14967829","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u4%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u4%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-70","id":"14967792","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u4%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u4%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-71","id":"14967816","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u4%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u4%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-72","id":"14967812","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u4%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u4%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-73","id":"14967826","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29u5%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29u5%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-74","id":"14967766","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i2%5C%282b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i2%282b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-75","id":"14967793","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-76","id":"14967790","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-77","id":"14967773","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-78","id":"14967786","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%283a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%283a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-79","id":"14967827","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-80","id":"14967785","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-81","id":"14967770","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-82","id":"14967777","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281z%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1z\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281z%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-83","id":"14967828","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":95,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5010%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5010:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"14967665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5020%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5020:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-1","id":"14967666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5548p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5548p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-2","id":"14967667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5548up%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5548up:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-3","id":"14967668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5596t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5596t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-4","id":"14967669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5596up%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5596up:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-5","id":"14967670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_56128p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_56128p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-6","id":"14967671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5624q%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5624q:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-7","id":"14967672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5648q%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5648q:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-8","id":"14967673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5672up%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5672up:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-9","id":"14967674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_5696q%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_5696q:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-10","id":"14967675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_6001%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_6001:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-11","id":"14967676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_6004%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_6004:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-12","id":"14967677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"14967715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-1","id":"14967690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-2","id":"14967686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-3","id":"14967699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-4","id":"14967679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-5","id":"14967720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-6","id":"14967678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-7","id":"14967682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-8","id":"14967703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-9","id":"14967696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%288%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%288%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-10","id":"14967713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%288a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%288a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-11","id":"14967694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%288b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%288b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-12","id":"14967745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%289%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%289%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-13","id":"14967746","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%289a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%289a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-14","id":"14967747","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29n1%5C%289b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29n1%289b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-15","id":"14967748","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-16","id":"14967689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-17","id":"14967749","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-18","id":"14967681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n1%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n1%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-19","id":"14967708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-20","id":"14967709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-21","id":"14967705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-22","id":"14967702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-23","id":"14967712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-24","id":"14967704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-25","id":"14967688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%285a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%285a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-26","id":"14967716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%285b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%285b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-27","id":"14967750","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-28","id":"14967680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.0%5C%282%5C%29n2%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.0%282%29n2%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-29","id":"14967714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%280%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(0\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%280%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-30","id":"14967698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%281%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(1\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%281%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-31","id":"14967692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%282%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%282%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-32","id":"14967717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-33","id":"14967719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%284%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%284%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-34","id":"14967710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%284%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%284%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-35","id":"14967751","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%285%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%285%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-36","id":"14967693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%285%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%285%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-37","id":"14967718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%286%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%286%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-38","id":"14967700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%286%5C%29n1%5C%282s%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(2s\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%286%29n1%282s%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-39","id":"14967752","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%286%5C%29n1%5C%283s%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(3s\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%286%29n1%283s%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-40","id":"14967753","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%286%5C%29n1%5C%284s%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(4s\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%286%29n1%284s%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-41","id":"14967754","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%287%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%287%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-42","id":"14967707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%287%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%287%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-43","id":"14967755","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%287%5C%29n1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%287%29n1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-44","id":"14967756","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%288%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%288%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-45","id":"14967691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%288%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%288%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-46","id":"14967757","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%280%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%280%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-47","id":"14967732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%280%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%280%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-48","id":"14967701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%280%5C%29n1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%280%29n1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-49","id":"14967685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%281%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%281%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-50","id":"14967683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%281%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%281%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-51","id":"14967723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%282%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%282%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-52","id":"14967695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%282%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%282%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-53","id":"14967733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%283%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%283%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-54","id":"14967687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%283%5C%29n1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%283%29n1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-55","id":"14967706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%283%5C%29n1%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%283%29n1%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-56","id":"14967724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%283%5C%29n1%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%283%29n1%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-57","id":"14967725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%283%5C%29n1%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%283%29n1%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-58","id":"14967734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%283%5C%29n1%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%283%29n1%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-59","id":"14967726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%284%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%284%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-60","id":"14967697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%284%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%284%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-61","id":"14967727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%284%5C%29n1%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%284%29n1%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-62","id":"14967728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%284%5C%29n1%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%284%29n1%281d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-63","id":"14967729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%285%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%285%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-64","id":"14967730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.1%5C%285%5C%29n1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.1%285%29n1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-65","id":"14967731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.2%5C%281%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.2%281%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-66","id":"14967711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%280%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%280%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-67","id":"14967684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%280%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%280%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-68","id":"14967735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%280%5C%29n1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%280%29n1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-69","id":"14967736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%281%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(1\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%281%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-70","id":"14967737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-71","id":"14967738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29n1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29n1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-72","id":"14967739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29n1%5C%281c%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1c\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29n1%281c%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-73","id":"14967740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%283%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(3\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%283%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-74","id":"14967741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%284%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%284%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-75","id":"14967742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%284%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%284%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-76","id":"14967743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%285%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(5\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%285%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-77","id":"14967721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%286%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%286%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-78","id":"14967744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%286%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%286%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-79","id":"14967758","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%287%5C%29n1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%287%29n1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-80","id":"14967722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%287%5C%29n1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%287%29n1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-81","id":"14967759","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":47,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_7000%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_7000:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"14967619","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_7700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_7700:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-1","id":"14967618","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29%3A-%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"14967664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-1","id":"14967620","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%283a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%283a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-2","id":"14967625","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-3","id":"14967630","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%285%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%285%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-4","id":"14967635","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%287%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%287%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-5","id":"14967627","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%289%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%289%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-6","id":"14967629","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%289a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%289a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-7","id":"14967663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-8","id":"14967632","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-9","id":"14967621","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%286%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%286%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-10","id":"14967633","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%286a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%286a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-11","id":"14967654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%286b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%286b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-12","id":"14967623","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%288%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%288%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-13","id":"14967634","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%288a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%288a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-14","id":"14967631","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%288b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%288b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-15","id":"14967626","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2810%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2810%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-16","id":"14967628","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2812%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2812%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-17","id":"14967622","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2814%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2814%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-18","id":"14967662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2814a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(14a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2814a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-19","id":"14967661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2814b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(14b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2814b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-20","id":"14967660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2816%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2816%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-21","id":"14967659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2818%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2818%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-22","id":"14967658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2820%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2820%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-23","id":"14967657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2820a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2820a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-24","id":"14967656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2822%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2822%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-25","id":"14967655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.2%5C%2824%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.2%2824%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-26","id":"14967639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.2%5C%280%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.2\\(0\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.2%280%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-27","id":"14967653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.2%5C%281%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.2\\(1\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.2%281%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-28","id":"14967624","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.2%5C%282%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.2%282%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-29","id":"14967636","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.2%5C%282%5C%29d1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.2%282%29d1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-30","id":"14967637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.2%5C%282%5C%29d1%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.2%282%29d1%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-31","id":"14967652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.2%5C%282%5C%29d1%5C%284%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(4\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.2%282%29d1%284%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-32","id":"14967651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%280%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%280%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-33","id":"14967642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%280%5C%29dx%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dx\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%280%29dx%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-34","id":"14967650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%281%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(1\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%281%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-35","id":"14967643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-36","id":"14967638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29d1%5C%281d%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1d\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29d1%281d%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-37","id":"14967649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29d1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29d1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-38","id":"14967648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29d1%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29d1%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-39","id":"14967647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%282%5C%29d1%5C%283a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%282%29d1%283a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-40","id":"14967644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%283%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(3\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%283%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-41","id":"14967641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%284%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(4\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%284%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-42","id":"14967646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%285%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(5\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%285%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-43","id":"14967640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.3%5C%286%5C%29d1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.3\\(6\\)d1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.3%286%29d1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-44","id":"14967645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":44,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_92304qc%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_92304qc:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"14967579","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_92348gc-x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_92348gc-x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-1","id":"14967602","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9236c%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9236c:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-2","id":"14967587","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9272q%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9272q:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-3","id":"14967583","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93108tc-ex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93108tc-ex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-4","id":"14967585","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93108tc-fx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93108tc-fx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-5","id":"14967594","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93120tx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93120tx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-6","id":"14967584","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93128tx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93128tx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-7","id":"14967581","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93180lc-ex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93180lc-ex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-8","id":"14967592","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93180yc-ex%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93180yc-ex:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-9","id":"14967578","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93180yc-fx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93180yc-fx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-10","id":"14967595","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93216tc-fx2%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93216tc-fx2:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-11","id":"14967601","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93240yc-fx2%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93240yc-fx2:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-12","id":"14967596","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9332c%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9332c:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-13","id":"14967599","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9332pq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9332pq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-14","id":"14967577","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_93360yc-fx2%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_93360yc-fx2:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-15","id":"14967600","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9336c-fx2%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9336c-fx2:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-16","id":"14967598","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9336pq_aci_spine%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9336pq_aci_spine:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-17","id":"14967586","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9348gc-fxp%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9348gc-fxp:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-18","id":"14967593","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9364c%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9364c:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-19","id":"14967597","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9372px%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9372px:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-20","id":"14967582","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9372px-e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9372px-e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-21","id":"14967591","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9372tx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9372tx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-22","id":"14967574","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9372tx-e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9372tx-e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-23","id":"14967590","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9396px%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9396px:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-24","id":"14967576","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9396tx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9396tx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-25","id":"14967589","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9504%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9504:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-26","id":"14967588","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9508%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9508:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-27","id":"14967580","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_9516%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_9516:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-28","id":"14967575","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i1%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i1\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i1%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"14967617","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i1%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i1\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i1%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-1","id":"14967616","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i2%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i2%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-2","id":"14967609","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i2%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i2%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-3","id":"14967610","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i2%5C%282a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i2%282a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-4","id":"14967606","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i2%5C%282b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i2%282b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-5","id":"14967613","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i2%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i2%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-6","id":"14967607","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-7","id":"14967612","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%282%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%282%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-8","id":"14967604","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%283%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%283%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-9","id":"14967611","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A6.1%5C%282%5C%29i3%5C%283a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:6.1%282%29i3%283a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-10","id":"14967614","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-11","id":"14967608","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-12","id":"14967603","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-13","id":"14967605","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A7.0%5C%283%5C%29i1%5C%281z%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1z\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:7.0%283%29i1%281z%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-14","id":"14967615","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":6,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Aucs_6248up%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:ucs_6248up:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-0","id":"14967568","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Aucs_6296up%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:ucs_6296up:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-1","id":"14967569","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Aucs_6324%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:ucs_6324:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-2","id":"14967570","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Aucs_6332%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:ucs_6332:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-3","id":"14967571","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Aucs_6332-16up%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:ucs_6332-16up:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-4","id":"14967572","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aucs_manager%3A3.2%5C%283n%5C%29a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:ucs_manager:3.2\\(3n\\)a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:ucs_manager:3.2%283n%29a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1-0","id":"14967573","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Adigi%3Asaros%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:digi:saros:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:digi:saros","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0","id":"14967567","matchCpes":[],"rangeDescription":" versions up to (excluding) 8.1.0.1 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"8.1.0.1","rangeId":"363978","rangeCpes":[]}],"containers":[]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Ahp%3Ax3220nr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:hp:x3220nr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:hp:x3220nr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0-0","id":"14967565","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Ahp%3Ax3220nr_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:hp:x3220nr_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:hp:x3220nr_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1-0","id":"14967566","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.00.11.08 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.00.11.08","rangeId":"363979","rangeCpes":[]}],"containers":[]}]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Atreck%3Atcp%5C%2Fip%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:treck:tcp%2fip","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0","id":"14967564","matchCpes":[],"rangeDescription":" versions up to (excluding) 6.0.1.67 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"6.0.1.67","rangeId":"363980","rangeCpes":[]}],"containers":[]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Acisco%3Aunified_computing_system%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:cisco:unified_computing_system:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:cisco:unified_computing_system:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0","id":"14967563","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 7 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/20/2024 11:54:53 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://datatracker.ietf.org/doc/html/rfc6169</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://kb.cert.org/vuls/id/636397/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.digi.com/resources/security</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/636397</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by CERT/CC</span> <span
|
||
data-testid="vuln-change-history-date-1">6/17/2024 6:15:10 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Description</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access control bypass, and other unexpected network behaviors.</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">CERT/CC AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">CWE</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">CERT/CC CWE-290</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">CWE</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">CERT/CC CWE-19</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">Reference</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">CERT/CC https://datatracker.ietf.org/doc/html/rfc6169 [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">CVE Modified by CERT/CC</span> <span
|
||
data-testid="vuln-change-history-date-2">5/14/2024 2:14:31 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-3">7/29/2020 11:00:03 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:hp:x3220nr_firmware:*:*:*:*:*:*:*:* versions from (including) 3.00.09 up to (including) 3.00.11
|
||
OR
|
||
cpe:2.3:h:hp:x3220nr_firmware:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:hp:x3220nr_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.00.11.08
|
||
OR
|
||
cpe:2.3:h:hp:x3220nr_firmware:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:treck:tcp\/ip:6.0.1.49:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:treck:tcp\/ip:*:*:*:*:*:*:*:* versions up to (excluding) 6.0.1.67</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:digi:saros:8.1.0.1:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:digi:saros:*:*:*:*:*:*:*:* versions up to (excluding) 8.1.0.1</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/636397 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/636397 Third Party Advisory, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">CVE Modified by CERT/CC</span> <span
|
||
data-testid="vuln-change-history-date-4">6/12/2020 12:15:10 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.kb.cert.org/vuls/id/636397 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-5">Reanalysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-5">6/09/2020 1:33:43 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
>Record truncated, showing 500 of 599 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br/>
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)u5\(1f\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.0\(2\)u2\(2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.0\(2\)u2\(4.92.4z\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.0\(2\)u5\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*
|
||
</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
|
||
>Record truncated, showing 500 of 5673 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)a1\(1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)a1\(2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)a1\(2a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1b\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1c\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)u1</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:6.2\(24\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:7.3\(5\)d1\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
|
||
>Record truncated, showing 500 of 2794 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\):-:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(3\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(3a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(4\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(5\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(7\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(9\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(9a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.2\(</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
>Record truncated, showing 500 of 784 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br/>
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:7.3\(7\)n1\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5624q:</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
|
||
>Record truncated, showing 500 of 5923 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(1a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(1b\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(2a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(3\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\(4\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)n1\</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(4.1b\):*:*:*:*:hyper-v:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(4.1b\):*:*:*:*:vsphere:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv5\(1.3\):*:*:*:*:vsphere:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_1000ve:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
|
||
>Record truncated, showing 500 of 2738 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sk3\(1.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sk3\(2.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sk3\(2.1a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sk3\(2.2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sk3\(2.2b\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sm1\(5.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sm1\(5.2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cis</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
>Record truncated, showing 500 of 1715 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br/>
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_931</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-5-showing"
|
||
|
||
>Record truncated, showing 500 of 2617 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/09/2020T13:33:43.190-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i1\(2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i1\(3\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i2\(1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i2\(2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i2\(2a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i2\(2b\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i2\(3\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.1\(2\)i3\(</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-5">
|
||
<td
|
||
data-testid="vuln-change-history-5-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-5-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-5-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-5-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:cisco:unified_computing_system:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-6">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-6">6/02/2020 4:19:22 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CWE</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-290</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:a:cisco:ucs_manager:3.2\(3n\)a:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-6-showing"
|
||
|
||
>Record truncated, showing 500 of 1715 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/02/2020T16:19:22.687-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_931</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-6-showing"
|
||
|
||
>Record truncated, showing 500 of 599 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/02/2020T16:19:22.687-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.0\(3\)u5\(1f\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.0\(2\)u2\(2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.0\(2\)u2\(4.92.4z\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:6.0\(2\)u5\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*
|
||
</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(4.1b\):*:*:*:*:hyper-v:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(4.1b\):*:*:*:*:vsphere:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv5\(1.3\):*:*:*:*:vsphere:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_1000ve:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:6.2\(24\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:7.3\(5\)d1\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-6-showing"
|
||
|
||
>Record truncated, showing 500 of 784 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-10136/change-record?changeRecordedOn=06/02/2020T16:19:22.687-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:7.3\(7\)n1\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_5624q:</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:hp:x3220nr_firmware:*:*:*:*:*:*:*:* versions from (including) 3.00.09 up to (including) 3.00.11
|
||
OR
|
||
cpe:2.3:h:hp:x3220nr_firmware:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:treck:tcp\/ip:6.0.1.49:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:digi:saros:8.1.0.1:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://kb.cert.org/vuls/id/636397/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">https://kb.cert.org/vuls/id/636397/ Third Party Advisory, US Government Resource</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4 Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.digi.com/resources/security No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.digi.com/resources/security Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2020-10136">CVE-2020-10136</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">06/02/2020</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/20/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">CERT/CC</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="hd1WBOz1GCSHe9N3oeCTmjViXUog6fxZ0XZE9dMb4OMMWpJEUfIXcxU16LT4QZyutUQzOrJiZ8FCP8g3Juw2TUKRH5pPupEViJwrnSzGqFHLE8B6I31h06kGUVl1A5Ai2F7sCtvhdBFuoxnse4OkRZWlK7koewT53JbpRBBznPLPdlt9l0GmCaV8bkbBOlpb3OKM2c3vjIX9Ry7SdlzVsZwCeqkURwo3vRfhxdBHbk0HiO2WCFcYgHwi67DdXMqz6Sjbb8m2Sv6wnPwn2dY21BESkXIchchVSX8CDTpIai9j94jgkTERFW1iIHPRJegbV36llWmVm2vHAm2MCLIPSYfqZbhmqmDRdhFlZv6nntp7HBz9netN00ZwnsJg" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|