1603 lines
438 KiB
Text
1603 lines
438 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2020-3228</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: true,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2020-3228</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-3228&vector=AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-danger">8.6 HIGH</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>8.6 </span><span data-testid='vuln-cvssv3-base-score-severity'>HIGH</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 4.0 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 3.9 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> None </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> None </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
<div class="row no-gutters">
|
||
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div id="v3CnaIconReference">
|
||
<img src="/site-media/images/NVD_Reference_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="Nist CVSS score does not match with CNA score">
|
||
|
||
</div>
|
||
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>CNA:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-cna">Cisco Systems, Inc.</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3CnaCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2020-3228&vector=AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H&version=3.0&source=Cisco%20Systems,%20Inc."
|
||
data-testid="vuln-cvss3-cna-panel-score"
|
||
class="label label-warning">6.8 MEDIUM</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-cna-vector"
|
||
class="tooltipCvss3CnaMetrics">CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H</span></span>
|
||
<input type="hidden" id="cnaV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.0 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>6.8 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 4.0 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 2.2 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Network </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> High </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> None </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> None </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2020-3228&vector=(AV:N/AC:L/Au:N/C:N/I:N/A:C)&version=2.0&source=NIST" class="label label-danger">7.8 HIGH</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:N/AC:L/Au:N/C:N/I:N/A:C)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>7.8 </span><span data-testid='vuln-cvssv2-base-score-severity'>HIGH</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:N/AC:L/Au:N/C:N/I:N/A:C)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>6.9</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>10.0</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Network</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Low</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>None</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>None</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>Complete</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows disruption of service<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR"
|
||
target="_blank" rel="noopener noreferrer">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noopener noreferrer">CWE-20</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Input Validation</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-0-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Cisco Systems, Inc. </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2020-3228"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":476,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A12.2%5C%286%5C%29i1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:12.2%286%29i1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0","id":"15132261","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%281%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%281%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1","id":"15132102","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%281%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%281%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-2","id":"15132088","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%281%5C%29sy2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%281%29sy2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-3","id":"15132205","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%281%5C%29sy3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%281%29sy3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-4","id":"15132189","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%281%5C%29sy4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%281%29sy4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-5","id":"15131993","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%281%5C%29sy5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%281%29sy5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-6","id":"15132095","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%281%5C%29sy6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%281%29sy6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-7","id":"15132031","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-8","id":"15131995","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-9","id":"15132005","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-10","id":"15132114","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-11","id":"15131972","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-12","id":"15132156","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy4a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy4a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-13","id":"15132113","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-14","id":"15132171","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-15","id":"15132045","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-16","id":"15132074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-17","id":"15132075","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-18","id":"15132221","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-19","id":"15131937","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy11%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy11","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-20","id":"15132104","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-21","id":"15132357","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy13%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy13","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-22","id":"15132354","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.1%5C%282%5C%29sy14%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy14:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.1%282%29sy14","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-23","id":"15132393","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-24","id":"15132026","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-25","id":"15132179","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-26","id":"15131984","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-27","id":"15132130","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29ey%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29ey","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-28","id":"15132111","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-29","id":"15131964","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-30","id":"15132203","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-31","id":"15132173","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-32","id":"15131957","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-33","id":"15132039","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-34","id":"15131996","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-35","id":"15132084","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-36","id":"15132267","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-37","id":"15132345","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-38","id":"15132344","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%281%5C%29sy8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%281%29sy8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-39","id":"15132401","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-40","id":"15132053","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-41","id":"15132035","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-42","id":"15132024","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-43","id":"15131960","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-44","id":"15132093","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-45","id":"15132119","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e5a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e5a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-46","id":"15132143","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e5b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e5b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-47","id":"15131941","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-48","id":"15131980","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-49","id":"15132185","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e7b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e7b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-50","id":"15132290","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-51","id":"15132301","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-52","id":"15132342","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e9a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e9a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-53","id":"15132346","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29e10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29e10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-54","id":"15132341","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29ea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29ea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-55","id":"15132252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29ea1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29ea1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-56","id":"15132008","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29ea2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29ea2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-57","id":"15131986","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29ea3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29ea3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-58","id":"15132195","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29eb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29eb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-59","id":"15132079","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29eb1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29eb1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-60","id":"15132062","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29eb2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29eb2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-61","id":"15132058","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-62","id":"15131943","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-63","id":"15132083","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29sy2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29sy2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-64","id":"15132127","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282%5C%29sy3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282%29sy3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-65","id":"15132229","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282a%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282a%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-66","id":"15132020","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282a%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282a%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-67","id":"15132137","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%282b%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%282b%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-68","id":"15132249","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-69","id":"15132073","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-70","id":"15132144","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-71","id":"15131949","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-72","id":"15132027","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283%5C%29e4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283%29e4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-73","id":"15131961","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283%5C%29e5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283%29e5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-74","id":"15132006","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283%5C%29ea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283%29ea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-75","id":"15132089","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283a%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283a%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-76","id":"15132108","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283m%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283m%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-77","id":"15132087","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283m%5C%29e7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283m%29e7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-78","id":"15132257","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%283m%5C%29e8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%283m%29e8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-79","id":"15132153","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-80","id":"15132029","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-81","id":"15132116","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-82","id":"15132070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-83","id":"15132168","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-84","id":"15132118","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-85","id":"15132273","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e5a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e5a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-86","id":"15132270","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-87","id":"15132288","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-88","id":"15132355","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29e8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29e8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-89","id":"15132392","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-90","id":"15131934","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-91","id":"15132043","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-92","id":"15132265","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-93","id":"15132055","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-94","id":"15131952","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-95","id":"15132216","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-96","id":"15132264","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-97","id":"15132347","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-98","id":"15132294","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ea9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ea9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-99","id":"15132281","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ec1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ec1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-100","id":"15131962","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284%5C%29ec2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284%29ec2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-101","id":"15132142","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284m%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284m%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-102","id":"15132078","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284m%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284m%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-103","id":"15132260","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284m%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284m%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-104","id":"15131975","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284n%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284n%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-105","id":"15132015","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284o%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284o%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-106","id":"15132167","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284o%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284o%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-107","id":"15132274","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284p%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284p%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-108","id":"15132099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284q%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284q%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-109","id":"15132272","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%284s%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%284s%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-110","id":"15132253","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-111","id":"15132194","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-112","id":"15132193","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-113","id":"15132096","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285%5C%29e2b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285%29e2b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-114","id":"15132215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285%5C%29e2c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285%29e2c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-115","id":"15132225","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285%5C%29ea%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285%29ea","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-116","id":"15132064","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285a%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285a%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-117","id":"15132011","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%285b%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%285b%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-118","id":"15132117","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-119","id":"15132293","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-120","id":"15132304","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e0c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e0c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-121","id":"15132295","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-122","id":"15132292","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-123","id":"15132309","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-124","id":"15132312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-125","id":"15132358","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e2a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e2a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-126","id":"15132353","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-127","id":"15132400","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29e4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)e4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29e4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-128","id":"15132391","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%286%5C%29eb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%286%29eb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-129","id":"15132409","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%287%5C%29e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%287%29e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-130","id":"15132363","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%287%5C%29e0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%287%29e0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-131","id":"15132388","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%287%5C%29e0b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%287%29e0b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-132","id":"15132404","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.2%5C%287%5C%29e0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.2%287%29e0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-133","id":"15132386","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%280%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(0\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%280%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-134","id":"15132263","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%281%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%281%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-135","id":"15132052","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%281%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%281%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-136","id":"15132048","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%281%5C%29sy2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%281%29sy2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-137","id":"15132049","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%282%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%282%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-138","id":"15131969","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%282%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%282%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-139","id":"15132206","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%282%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%282%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-140","id":"15131959","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%282%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%282%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-141","id":"15132182","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%282%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%282%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-142","id":"15132164","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29jaa1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29jaa1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-143","id":"15132348","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29jpi%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29jpi","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-144","id":"15132394","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29jpj%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29jpj","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-145","id":"15132406","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-146","id":"15132063","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-147","id":"15132152","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-148","id":"15132068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-149","id":"15132094","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-150","id":"15132145","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-151","id":"15132007","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-152","id":"15132133","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-153","id":"15132115","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-154","id":"15132009","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m8a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m8a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-155","id":"15132057","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-156","id":"15132067","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29m10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)m10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29m10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-157","id":"15132329","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.3%5C%283%5C%29xb12%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.3\\(3\\)xb12:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.3%283%29xb12","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-158","id":"15132326","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29cg1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29cg1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-159","id":"15132192","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-160","id":"15131967","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-161","id":"15132085","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29sy2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29sy2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-162","id":"15132071","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29sy3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29sy3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-163","id":"15132258","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29sy4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29sy4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-164","id":"15132359","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-165","id":"15132098","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-166","id":"15132109","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-167","id":"15131985","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-168","id":"15132059","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%281%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%281%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-169","id":"15132181","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%282%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%282%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-170","id":"15132100","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%282%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%282%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-171","id":"15131983","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%282%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%282%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-172","id":"15132003","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%282%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%282%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-173","id":"15132037","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%282%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%282%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-174","id":"15132208","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-175","id":"15132199","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-176","id":"15132180","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-177","id":"15131978","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-178","id":"15132030","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-179","id":"15132123","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-180","id":"15132121","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-181","id":"15132197","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m6a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m6a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-182","id":"15132187","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-183","id":"15132201","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m7a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m7a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m7a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-184","id":"15132234","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-185","id":"15132235","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-186","id":"15132327","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.4%5C%283%5C%29m10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.4%283%29m10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-187","id":"15132317","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29sy%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29sy","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-188","id":"15132131","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29sy1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29sy1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-189","id":"15132217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29sy2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29sy2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-190","id":"15132356","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29sy3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29sy3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-191","id":"15132408","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-192","id":"15132106","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-193","id":"15131940","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-194","id":"15132154","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-195","id":"15131954","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%281%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%281%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-196","id":"15132097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%282%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%282%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-197","id":"15131994","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%282%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%282%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-198","id":"15132160","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%282%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%282%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-199","id":"15132101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%282%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%282%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-200","id":"15132018","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%282%5C%29t4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%282%29t4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-201","id":"15132136","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%282%5C%29xb%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(2\\)xb:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%282%29xb","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-202","id":"15132324","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-203","id":"15132040","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-204","id":"15132069","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-205","id":"15132016","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m2a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m2a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m2a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-206","id":"15132331","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-207","id":"15132010","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-208","id":"15132166","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m4a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m4a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-209","id":"15131951","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m4b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m4b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-210","id":"15132236","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m4c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m4c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-211","id":"15132237","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-212","id":"15132176","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-213","id":"15132105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m6a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m6a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-214","id":"15132238","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-215","id":"15132336","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-216","id":"15132337","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.5%5C%283%5C%29m9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.5%283%29m9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-217","id":"15132402","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%281%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%281%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-218","id":"15132210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%281%5C%29t0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%281%29t0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-219","id":"15132138","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%281%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%281%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-220","id":"15132110","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%281%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%281%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-221","id":"15131948","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%281%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%281%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-222","id":"15132214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%282%5C%29t%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%282%29t","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-223","id":"15132128","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%282%5C%29t0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%282%29t0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-224","id":"15132283","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%282%5C%29t1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%282%29t1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-225","id":"15131971","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%282%5C%29t2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%282%29t2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-226","id":"15132047","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%282%5C%29t3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%282%29t3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-227","id":"15131946","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-228","id":"15132120","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-229","id":"15132132","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-230","id":"15131981","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-231","id":"15132239","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-232","id":"15132163","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m2a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m2a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-233","id":"15132017","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-234","id":"15131987","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m3a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m3a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-235","id":"15132240","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-236","id":"15132284","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-237","id":"15132323","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-238","id":"15132398","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.6%5C%283%5C%29m6a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.6%283%29m6a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-239","id":"15132387","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-240","id":"15132013","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-241","id":"15132241","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-242","id":"15132242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-243","id":"15132243","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-244","id":"15132319","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-245","id":"15132389","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m4a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m4a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-246","id":"15132405","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.7%5C%283%5C%29m4b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.7%283%29m4b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-247","id":"15132390","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.8%5C%283%5C%29m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.8%283%29m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-248","id":"15132334","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.8%5C%283%5C%29m0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.8%283%29m0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-249","id":"15132325","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.8%5C%283%5C%29m0b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.8%283%29m0b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-250","id":"15132335","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.8%5C%283%5C%29m1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.8%283%29m1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-251","id":"15132399","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.8%5C%283%5C%29m1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.8%283%29m1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-252","id":"15132395","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.8%5C%283%5C%29m2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.8%283%29m2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-253","id":"15132397","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.8%5C%283%5C%29m3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.8%283%29m3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-254","id":"15132396","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.9%5C%283%5C%29m%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.9%283%29m","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-255","id":"15132403","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios%3A15.9%5C%283%5C%29m0a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios:15.9%283%29m0a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-256","id":"15132407","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.0se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.0se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-257","id":"15132086","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.0xo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.0xo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-258","id":"15132165","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.1se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.1se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-259","id":"15132054","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.1xo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.1xo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-260","id":"15132056","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.2se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.2se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-261","id":"15132023","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.2xo%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.2xo","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-262","id":"15132140","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.3se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.3se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-263","id":"15132004","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.4se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.4se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-264","id":"15131973","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.3.5se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.3.5se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-265","id":"15131991","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.5.0e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.5.0e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-266","id":"15132188","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.5.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.5.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-267","id":"15131990","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.5.2e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.5.2e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-268","id":"15132076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.5.3e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.5.3e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-269","id":"15132134","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.0ae%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.0ae","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-270","id":"15132255","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.0be%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.0be","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-271","id":"15132269","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.0e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.0e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-272","id":"15131982","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-273","id":"15132174","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.2ae%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.2ae","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-274","id":"15132000","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.3e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.3e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-275","id":"15132135","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.4e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.4e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-276","id":"15131966","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.5ae%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.5ae","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-277","id":"15131963","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.5be%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.5be","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-278","id":"15131938","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.5e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.5e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-279","id":"15132183","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.6e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.6e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-280","id":"15131970","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.7ae%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.7ae","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-281","id":"15132287","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.7be%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.7be","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-282","id":"15132305","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.7e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.7e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-283","id":"15132021","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.8e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.8e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-284","id":"15132285","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.9ae%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.9ae:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.9ae","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-285","id":"15132343","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.9e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.9e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-286","id":"15132339","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.6.10e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.6.10e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-287","id":"15132313","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.7.0e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.7.0e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-288","id":"15132172","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.7.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.7.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-289","id":"15131965","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.7.2e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.7.2e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-290","id":"15132129","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.7.3e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.7.3e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-291","id":"15132124","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.7.4e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.7.4e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-292","id":"15131944","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.7.5e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.7.5e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-293","id":"15132082","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.0e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.0e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-294","id":"15132200","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-295","id":"15132141","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.2e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.2e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-296","id":"15132112","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.3e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.3e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-297","id":"15131958","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.4e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.4e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-298","id":"15132014","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.5ae%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.5ae","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-299","id":"15132271","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.5e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.5e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-300","id":"15132248","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.6e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.6e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-301","id":"15132306","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.7e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.7e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-302","id":"15132340","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.8.8e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.8.8e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-303","id":"15132374","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.0as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.0as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-304","id":"15131992","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.0e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.0e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-305","id":"15131947","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-306","id":"15131998","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-307","id":"15132209","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-308","id":"15132092","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.2be%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.2be","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-309","id":"15132266","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.2e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.2e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-310","id":"15132226","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.9.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.9.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-311","id":"15132022","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.0ce%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.0ce","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-312","id":"15132286","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.0e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.0e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-313","id":"15132291","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-314","id":"15132122","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.1ae%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.1ae","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-315","id":"15132310","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-316","id":"15132308","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-317","id":"15131997","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.1se%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.1se","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-318","id":"15132311","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.2as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.2as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.2as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-319","id":"15132320","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.2e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.2e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-320","id":"15132338","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-321","id":"15132001","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.2ts%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.2ts","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-322","id":"15132060","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.3e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.3e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-323","id":"15132378","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-324","id":"15132061","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-325","id":"15132198","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.5s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.5s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-326","id":"15131988","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.6s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.6s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-327","id":"15131936","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.7s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.7s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-328","id":"15132077","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.8as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.8as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-329","id":"15132148","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.8s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.8s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-330","id":"15131989","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.9s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.9s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-331","id":"15132222","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.10.10s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.10.10s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-332","id":"15132328","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.11.0e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.11.0e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-333","id":"15132370","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.11.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.11.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-334","id":"15132090","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.11.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.11.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-335","id":"15132204","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.11.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.11.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-336","id":"15132032","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.11.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.11.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-337","id":"15132050","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.11.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.11.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-338","id":"15132184","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.12.0as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.12.0as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-339","id":"15132091","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.12.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.12.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-340","id":"15132158","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.12.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.12.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-341","id":"15132159","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.12.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.12.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-342","id":"15131979","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.12.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.12.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-343","id":"15132190","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.12.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.12.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-344","id":"15132161","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.0as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.0as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-345","id":"15132186","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-346","id":"15131956","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-347","id":"15132196","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.2as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.2as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-348","id":"15132178","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-349","id":"15131935","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-350","id":"15132170","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-351","id":"15131950","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.5as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.5as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-352","id":"15132034","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.5s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.5s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-353","id":"15132028","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.6as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.6as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-354","id":"15132175","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.6bs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.6bs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-355","id":"15132321","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.6s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.6s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-356","id":"15131939","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.7as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.7as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-357","id":"15132081","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.7s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.7s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-358","id":"15132220","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.8s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.8s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-359","id":"15132207","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.9s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.9s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-360","id":"15132230","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.13.10s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.13.10s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-361","id":"15132318","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.14.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.14.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-362","id":"15132066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.14.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.14.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-363","id":"15131977","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.14.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.14.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-364","id":"15132150","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.14.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.14.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-365","id":"15132036","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.14.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.14.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-366","id":"15131942","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.15.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.15.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-367","id":"15132033","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.15.1cs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.15.1cs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-368","id":"15131945","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.15.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.15.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-369","id":"15132103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.15.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.15.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-370","id":"15132147","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.15.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.15.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-371","id":"15132051","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.15.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.15.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-372","id":"15132151","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.0cs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.0cs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-373","id":"15132025","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-374","id":"15131976","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.1as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.1as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-375","id":"15132157","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-376","id":"15132080","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.2bs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.2bs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-377","id":"15132155","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-378","id":"15132019","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-379","id":"15132139","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.4as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.4as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-380","id":"15132169","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.4bs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.4bs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-381","id":"15132177","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.4cs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.4cs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-382","id":"15132251","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.4ds%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.4ds","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-383","id":"15132126","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.4es%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.4es","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-384","id":"15132256","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.4gs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.4gs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-385","id":"15132250","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.5as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.5as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-386","id":"15132268","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.5bs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.5bs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-387","id":"15132254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.5s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.5s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-388","id":"15132072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.6bs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.6bs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-389","id":"15132218","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.6s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.6s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-390","id":"15132065","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.7as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.7as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-391","id":"15132297","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.7bs%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.7bs","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-392","id":"15132302","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.7s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.7s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-393","id":"15132298","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.8s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.8s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-394","id":"15132333","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.9s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.9s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-395","id":"15132371","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.16.10s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.16.10s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-396","id":"15132360","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.17.0s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.17.0s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-397","id":"15132125","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.17.1as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.17.1as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-398","id":"15131999","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.17.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.17.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-399","id":"15132146","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.17.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.17.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-400","id":"15132046","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.17.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.17.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-401","id":"15131974","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.17.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.17.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-402","id":"15132044","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.0as%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.0as","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-403","id":"15132012","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.1asp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.1asp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-404","id":"15132202","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.1sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.1sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-405","id":"15132042","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.2asp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.2asp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-406","id":"15132002","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.3asp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.3asp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-407","id":"15132289","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.3bsp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.3bsp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-408","id":"15132300","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.3sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.3sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-409","id":"15132038","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.4sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.4sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-410","id":"15132303","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.5sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.5sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-411","id":"15132332","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A3.18.6sp%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:3.18.6sp","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-412","id":"15132385","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.1.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.1.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-413","id":"15132107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.1.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.1.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-414","id":"15131968","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.1.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.1.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-415","id":"15131955","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.2.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.2.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-416","id":"15131953","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.2.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.2.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-417","id":"15132162","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-418","id":"15132191","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-419","id":"15132211","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-420","id":"15132212","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-421","id":"15132213","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-422","id":"15132224","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-423","id":"15132259","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.5b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.5b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-424","id":"15132231","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-425","id":"15132232","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-426","id":"15132314","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-427","id":"15132315","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.3.9%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.3.9","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-428","id":"15132375","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-429","id":"15132149","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.4.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.4.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-430","id":"15132228","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.4.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.4.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-431","id":"15132282","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.5.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.5.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-432","id":"15132219","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.5.1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.5.1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-433","id":"15132223","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.5.1b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.5.1b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-434","id":"15132227","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.5.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.5.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-435","id":"15132262","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.5.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.5.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-436","id":"15132307","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-437","id":"15132041","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-438","id":"15132246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-439","id":"15132233","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-440","id":"15132330","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.4a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.4a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-441","id":"15132352","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.4s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.4s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-442","id":"15132322","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.5%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-443","id":"15132361","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.5b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.5b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-444","id":"15132373","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.6.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.6.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-445","id":"15132372","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.7.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.7.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-446","id":"15132245","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.7.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.7.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-447","id":"15132278","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.7.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-448","id":"15132279","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.8.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.8.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-449","id":"15132244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.8.1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.8.1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-450","id":"15132275","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.8.1c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.8.1c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-451","id":"15132280","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.8.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.8.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-452","id":"15132276","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-453","id":"15132277","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.8.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.8.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-454","id":"15132383","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-455","id":"15132247","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-456","id":"15132350","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.1c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.1c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-457","id":"15132299","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.1d%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.1d","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-458","id":"15132316","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-459","id":"15132296","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-460","id":"15132351","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.2s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.2s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-461","id":"15132369","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-462","id":"15132380","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.3a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.3a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-463","id":"15132376","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.9.3s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.9.3s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-464","id":"15132384","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.10.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.10.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-465","id":"15132349","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.10.1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.10.1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-466","id":"15132377","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.10.1b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.10.1b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-467","id":"15132382","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.10.1e%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.10.1e","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-468","id":"15132381","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.10.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.10.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-469","id":"15132368","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.10.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.10.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-470","id":"15132379","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.11.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.11.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-471","id":"15132362","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.11.1a%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.11.1a","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-472","id":"15132364","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.11.1b%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.11.1b","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-473","id":"15132366","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.11.1c%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.11.1c","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-474","id":"15132365","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Aios_xe%3A16.11.1s%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:ios_xe:16.11.1s","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-475","id":"15132367","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":9,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%283.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%283.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"15132417","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%283.15%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.15\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%283.15%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-1","id":"15132416","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-2","id":"15132415","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1a%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1a%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-3","id":"15132414","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv3%5C%284.1b%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv3%284.1b%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-4","id":"15132413","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv5%5C%281.1%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv5%281.1%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-5","id":"15132412","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv5%5C%281.2%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv5%281.2%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-6","id":"15132411","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A5.2%5C%281%5C%29sv5%5C%281.3%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:5.2%281%29sv5%281.3%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-7","id":"15132410","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_1000v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_1000v:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"15132418","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":5,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acisco%3Anx-os%3A8.0%5C%281%5C%29%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:cisco:nx-os:8.0%281%29","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"15132419","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_7000_10-slot%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_7000_10-slot:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"15132423","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_7000_18-slot%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_7000_18-slot:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-1","id":"15132422","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_7000_4-slot%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_7000_4-slot:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-2","id":"15132420","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Acisco%3Anexus_7000_9-slot%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:cisco:nexus_7000_9-slot:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-3","id":"15132421","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 5 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/21/2024 12:30:36 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by Cisco Systems, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-1">5/14/2024 3:09:55 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">Reanalysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-2">10/18/2021 8:08:41 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
>Record truncated, showing 500 of 604 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-3228/change-record?changeRecordedOn=10/18/2021T08:08:41.727-0400">View Entire Change Record</a><br/>
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(3.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(3.15\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(4.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(4.1a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(4.1b\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv5\(1.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv5\(1.2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:ci</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-2-showing"
|
||
|
||
>Record truncated, showing 500 of 604 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-3228/change-record?changeRecordedOn=10/18/2021T08:08:41.727-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(3.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(3.15\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(4.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(4.1a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv3\(4.1b\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv5\(1.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:nx-os:5.2\(1\)sv5\(1.2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:o:ci</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:a:cisco:nx-os:8.0\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:cisco:nx-os:8.0\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">Reanalysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-3">9/17/2021 2:44:56 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-4">6/09/2020 2:57:55 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:N/AC:L/Au:N/C:N/I:N/A:C)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CWE</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-20</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-4-showing"
|
||
|
||
>Record truncated, showing 500 of 604 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-3228/change-record?changeRecordedOn=06/09/2020T14:57:55.493-0400">View Entire Change Record</a><br />
|
||
<pre>AND
|
||
OR
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(3.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(3.15\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(4.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(4.1a\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv3\(4.1b\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv5\(1.1\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:cisco:nx-os:5.2\(1\)sv5\(1.2\):*:*:*:*:*:*:*
|
||
*cpe:2.3:a:ci</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:a:cisco:nx-os:8.0\(1\):*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*
|
||
cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-4-showing"
|
||
|
||
>Record truncated, showing 500 of 24628 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2020-3228/change-record?changeRecordedOn=06/09/2020T14:57:55.493-0400">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:o:cisco:ios:12.2\(6\)i1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(1\)sy:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(1\)sy1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(1\)sy2:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(1\)sy3:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(1\)sy4:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(1\)sy5:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(1\)sy6:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:ios:15.1\(2\)sy:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:cisco:i</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR Patch, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2020-3228">CVE-2020-3228</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">06/03/2020</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Cisco Systems, Inc.</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="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" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|